{"id":"CVE-2010-4180","details":"OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.","modified":"2026-04-10T03:41:29.701298Z","published":"2010-12-06T21:05:48Z","related":["SUSE-SU-2015:1184-1","SUSE-SU-403","SUSE-SU-403 Forbidden-1"],"references":[{"type":"ADVISORY","url":"http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052027.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052315.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=129916880600544&w=2"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=130497251507577&w=2"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=132077688910227&w=2"},{"type":"ADVISORY","url":"http://openssl.org/news/secadv_20101202.txt"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42469"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42473"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42493"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42571"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42620"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42811"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42877"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43169"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43170"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43171"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43172"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43173"},{"type":"ADVISORY","url":"http://secunia.com/advisories/44269"},{"type":"ADVISORY","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471"},{"type":"ADVISORY","url":"http://support.apple.com/kb/HT4723"},{"type":"ADVISORY","url":"http://ubuntu.com/usn/usn-1029-1"},{"type":"ADVISORY","url":"http://www.debian.org/security/2011/dsa-2141"},{"type":"ADVISORY","url":"http://www.kb.cert.org/vuls/id/737740"},{"type":"ADVISORY","url":"http://www.redhat.com/support/errata/RHSA-2010-0977.html"},{"type":"ADVISORY","url":"http://www.redhat.com/support/errata/RHSA-2010-0978.html"},{"type":"ADVISORY","url":"http://www.redhat.com/support/errata/RHSA-2010-0979.html"},{"type":"ADVISORY","url":"http://www.redhat.com/support/errata/RHSA-2011-0896.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/522176"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/45164"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1024822"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=659462"},{"type":"ADVISORY","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18910"},{"type":"ARTICLE","url":"http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052027.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052315.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html"},{"type":"FIX","url":"http://cvs.openssl.org/chngview?cn=20131"},{"type":"FIX","url":"http://openssl.org/news/secadv_20101202.txt"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=659462"},{"type":"REPORT","url":"http://marc.info/?l=bugtraq&m=129916880600544&w=2"},{"type":"REPORT","url":"http://marc.info/?l=bugtraq&m=130497251507577&w=2"},{"type":"REPORT","url":"http://marc.info/?l=bugtraq&m=132077688910227&w=2"},{"type":"REPORT","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:248"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2010/3120"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2010/3122"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2010/3134"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2010/3188"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2011/0032"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2011/0076"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2011/0268"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=659462"},{"type":"WEB","url":"http://cvs.openssl.org/chngview?cn=20131"},{"type":"WEB","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"},{"type":"WEB","url":"http://osvdb.org/69565"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/737740"},{"type":"WEB","url":"http://www.securitytracker.com/id?1024822"},{"type":"WEB","url":"https://kb.bluecoat.com/index?page=content&id=SA53&actp=LIST"}],"schema_version":"1.7.5"}