The ssl_parse_client_key_exchange function in XySSL before 0.9 does not protect against certain Bleichenbacher attacks using chosen ciphertext, which allows remote attackers to recover keys via unspecified vectors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xyssl | Xyssl | * | 0.8 (including) |
Xyssl | Xyssl | 0.1 (including) | 0.1 (including) |
Xyssl | Xyssl | 0.2 (including) | 0.2 (including) |
Xyssl | Xyssl | 0.3 (including) | 0.3 (including) |
Xyssl | Xyssl | 0.4 (including) | 0.4 (including) |
Xyssl | Xyssl | 0.5 (including) | 0.5 (including) |
Xyssl | Xyssl | 0.6 (including) | 0.6 (including) |
Xyssl | Xyssl | 0.7 (including) | 0.7 (including) |
Xyssl | Ubuntu | hardy | * |
Xyssl | Ubuntu | upstream | * |