CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2010-4180

OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
Publish Date : 2010-12-06 Last Update Date : 2022-08-04
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
4.3
Confidentiality Impact None (There is no impact to the confidentiality of the system.)
Integrity Impact Partial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability Impact None (There is no impact to the availability of the system.)
Access Complexity Medium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s)
CWE ID CWE id is not defined for this vulnerability

- Additional Vendor Supplied Data

Vendor Impact CVSS Score CVSS Vector Report Date Publish Date
Redhat moderate
4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N 2010-12-02 2010-12-02
If you are a vendor and you have additional data which can be automatically imported into our database, please contact admin @ cvedetails.com

- Related OVAL Definitions

Title Definition Id Class Family
CVE-2010-4180 oval:org.opensuse.security:def:20104180 unix
DEPRECATED: ELSA-2010-0978 -- openssl security update (moderate) oval:org.mitre.oval:def:27785 unix
DEPRECATED: ELSA-2010-0979 -- openssl security update (moderate) oval:org.mitre.oval:def:28187 unix
DSA-2141-1 openssl -- SSL/TLS insecure renegotiation protocol design flaw oval:org.mitre.oval:def:12707 unix
DSA-2141-2 nss -- SSL/TLS insecure renegotiation protocol design flaw oval:org.mitre.oval:def:12801 unix
ELSA-2010:0978: openssl security update (Moderate) oval:org.mitre.oval:def:22306 unix
ELSA-2010:0979: openssl security update (Moderate) oval:org.mitre.oval:def:22780 unix
HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass oval:org.mitre.oval:def:19547 unix
Multiple OpenSSL vulnerabilities oval:org.mitre.oval:def:20828 unix
OpenSSL vulnerability before 0.9.8q, and 1.0.x before 1.0.0c in VisualSVN Server (CVE-2010-4180) oval:org.mitre.oval:def:18910 windows
RHSA-2010:0977: openssl security update (Moderate) oval:com.redhat.rhsa:def:20100977 unix
RHSA-2010:0978: openssl security update (Moderate) oval:org.mitre.oval:def:22038 unix
RHSA-2010:0978: openssl security update (Moderate) oval:com.redhat.rhsa:def:20100978 unix
RHSA-2010:0979: openssl security update (Moderate) oval:org.mitre.oval:def:22097 unix
RHSA-2010:0979: openssl security update (Moderate) oval:com.redhat.rhsa:def:20100979 unix
SUSE-SU-2013:1165-1 -- Security update for libcurl4 oval:org.mitre.oval:def:25193 unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:19752 unix
VMware vSphere and vCOps updates to third party libraries oval:org.mitre.oval:def:20705 unix
Vulnerability in OpenSSL 0.9.8q, and 1.0.x before 1.0.0c, does not properly prevent modification of the ciphersuite in t... oval:org.mitre.oval:def:24969 windows
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify a vulnerability or a missing patch. Check out the OVAL definitions if you want to learn what you should do to verify a vulnerability.

- Products Affected By CVE-2010-4180

# Product Type Vendor Product Version Update Edition Language
1 OS Canonical Ubuntu Linux 6.06 * * * Version Details Vulnerabilities
2 OS Canonical Ubuntu Linux 8.04 * * * Version Details Vulnerabilities
3 OS Canonical Ubuntu Linux 9.04 * * * Version Details Vulnerabilities
4 OS Canonical Ubuntu Linux 10.04 * * * Version Details Vulnerabilities
5 OS Canonical Ubuntu Linux 10.10 * * * Version Details Vulnerabilities
6 OS Debian Debian Linux 5.0 * * * Version Details Vulnerabilities
7 Application F5 Nginx * * * * Version Details Vulnerabilities
8 OS Fedoraproject Fedora 13 * * * Version Details Vulnerabilities
9 OS Fedoraproject Fedora 14 * * * Version Details Vulnerabilities
10 Application Openssl Openssl * * * * Version Details Vulnerabilities
11 OS Opensuse Opensuse 11.1 * * * Version Details Vulnerabilities
12 OS Opensuse Opensuse 11.2 * * * Version Details Vulnerabilities
13 OS Opensuse Opensuse 11.3 * * * Version Details Vulnerabilities
14 OS Opensuse Opensuse 11.4 * * * Version Details Vulnerabilities
15 OS Suse Linux Enterprise 11.0 SP1 * * Version Details Vulnerabilities
16 OS Suse Linux Enterprise Desktop 10 SP3 * * Version Details Vulnerabilities
17 OS Suse Linux Enterprise Desktop 10 SP4 * * Version Details Vulnerabilities
18 OS Suse Linux Enterprise Desktop 11 SP1 * * Version Details Vulnerabilities
19 OS Suse Linux Enterprise Server 9 * * * Version Details Vulnerabilities
20 OS Suse Linux Enterprise Server 10 SP4 * * Version Details Vulnerabilities
21 OS Suse Linux Enterprise Server 10 SP3 * * Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Canonical Ubuntu Linux 5
Debian Debian Linux 1
F5 Nginx 1
Fedoraproject Fedora 2
Openssl Openssl 1
Opensuse Opensuse 4
Suse Linux Enterprise 1
Suse Linux Enterprise Desktop 3
Suse Linux Enterprise Server 3

- References For CVE-2010-4180

http://secunia.com/advisories/43170
SECUNIA 43170
http://www.redhat.com/support/errata/RHSA-2010-0977.html
REDHAT RHSA-2010:0977
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
SUSE SUSE-SR:2011:001
http://www.vupen.com/english/advisories/2011/0268
VUPEN ADV-2011-0268
http://secunia.com/advisories/43171
SECUNIA 43171
http://marc.info/?l=bugtraq&m=130497251507577&w=2
HP SSRT100475
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18910
OVAL oval:org.mitre.oval:def:18910
http://www.kb.cert.org/vuls/id/737740
CERT-VN VU#737740
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
SUSE SUSE-SR:2011:009
http://marc.info/?l=bugtraq&m=129916880600544&w=2
HP HPSBUX02638
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777
HP HPSBMA02658
http://www.securityfocus.com/archive/1/522176
HP SSRT100817
http://marc.info/?l=bugtraq&m=132077688910227&w=2
HP HPSBHF02706
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
SUSE SUSE-SU-2011:0847
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052315.html
FEDORA FEDORA-2010-18736
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
SUSE openSUSE-SU-2011:0845
https://kb.bluecoat.com/index?page=content&id=SA53&actp=LIST CONFIRM
http://www.redhat.com/support/errata/RHSA-2011-0896.html
REDHAT RHSA-2011:0896
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
APPLE APPLE-SA-2011-06-23-1
http://support.apple.com/kb/HT4723 CONFIRM
http://www.vupen.com/english/advisories/2011/0076
VUPEN ADV-2011-0076
http://secunia.com/advisories/43169
SECUNIA 43169
http://secunia.com/advisories/43172
SECUNIA 43172
http://secunia.com/advisories/44269
SECUNIA 44269
http://ubuntu.com/usn/usn-1029-1
UBUNTU USN-1029-1
http://secunia.com/advisories/42473
SECUNIA 42473
http://www.debian.org/security/2011/dsa-2141
DEBIAN DSA-2141
http://secunia.com/advisories/42877
SECUNIA 42877
http://www.redhat.com/support/errata/RHSA-2010-0978.html
REDHAT RHSA-2010:0978
http://secunia.com/advisories/42811
SECUNIA 42811
http://www.vupen.com/english/advisories/2011/0032
VUPEN ADV-2011-0032
http://www.redhat.com/support/errata/RHSA-2010-0979.html
REDHAT RHSA-2010:0979
http://secunia.com/advisories/42571
SECUNIA 42571
http://secunia.com/advisories/42469
SECUNIA 42469
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052027.html
FEDORA FEDORA-2010-18765
http://secunia.com/advisories/43173
SECUNIA 43173
http://www.vupen.com/english/advisories/2010/3188
VUPEN ADV-2010-3188
http://www.securityfocus.com/bid/45164
BID 45164 OpenSSL Ciphersuite Downgrade Security Weakness Release Date:2013-04-24
http://www.mandriva.com/security/advisories?name=MDVSA-2010:248
MANDRIVA MDVSA-2010:248
http://osvdb.org/69565
OSVDB 69565
http://www.securitytracker.com/id?1024822
SECTRACK 1024822
http://secunia.com/advisories/42493
SECUNIA 42493
http://www.vupen.com/english/advisories/2010/3134
VUPEN ADV-2010-3134
https://bugzilla.redhat.com/show_bug.cgi?id=659462 CONFIRM
http://openssl.org/news/secadv_20101202.txt CONFIRM
http://www.vupen.com/english/advisories/2010/3120
VUPEN ADV-2010-3120
http://www.vupen.com/english/advisories/2010/3122
VUPEN ADV-2010-3122
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471
SLACKWARE SSA:2010-340-01
http://cvs.openssl.org/chngview?cn=20131 CONFIRM
http://secunia.com/advisories/42620
SECUNIA 42620

- Metasploit Modules Related To CVE-2010-4180

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.