Files
CVEs-PoC/2014/CVE-2014-3511.md
T
2024-06-18 02:51:15 +02:00

22 lines
993 B
Markdown

### [CVE-2014-3511](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
### POC
#### Reference
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ypnose/ahrf
- https://github.com/chnzzh/OpenSSL-CVE-lib
- https://github.com/jumanjihouse/oval
- https://github.com/jumanjihouse/wormhole