CVE-2009-3555

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

Published : 2009-11-09 17:30 Updated : 2019-07-03 17:25

5.8
CVSS Score More info
Score 5.8 / 10
5.8
Vendor Product Version URI
Apache Http Server 2.2.14 cpe:/a:apache:http_server:2.2.14
Gnu Gnutls 2.8.5 cpe:/a:gnu:gnutls:2.8.5
Mozilla Nss 3.12.4 cpe:/a:mozilla:nss:3.12.4
Openssl Openssl 0.9.8k cpe:/a:openssl:openssl:0.9.8k
Canonical Ubuntu Linux 8.04 cpe:/o:canonical:ubuntu_linux:8.04::~~lts~~~
Canonical Ubuntu Linux 8.10 cpe:/o:canonical:ubuntu_linux:8.10
Canonical Ubuntu Linux 9.04 cpe:/o:canonical:ubuntu_linux:9.04
Canonical Ubuntu Linux 9.10 cpe:/o:canonical:ubuntu_linux:9.10
Canonical Ubuntu Linux 10.04 cpe:/o:canonical:ubuntu_linux:10.04::~~lts~~~
Canonical Ubuntu Linux 10.10 cpe:/o:canonical:ubuntu_linux:10.10
Debian Debian Linux 4.0 cpe:/o:debian:debian_linux:4.0
Debian Debian Linux 5.0 cpe:/o:debian:debian_linux:5.0
Debian Debian Linux 6.0 cpe:/o:debian:debian_linux:6.0
Debian Debian Linux 7.0 cpe:/o:debian:debian_linux:7.0
Debian Debian Linux 8.0 cpe:/o:debian:debian_linux:8.0
Fedoraproject Fedora 11 cpe:/o:fedoraproject:fedora:11
Fedoraproject Fedora 12 cpe:/o:fedoraproject:fedora:12
Fedoraproject Fedora 13 cpe:/o:fedoraproject:fedora:13
Fedoraproject Fedora 14 cpe:/o:fedoraproject:fedora:14
Microsoft Internet Information Server 7.0 cpe:/a:microsoft:internet_information_server:7.0
Openssl Openssl 1.0 cpe:/a:openssl:openssl:1.0::openvms
  1. Openssl (1) Search CVE
    1. Openssl (2) Search CVE
      1. 0.9.8k
      2. 1.0
  2. Apache (1) Search CVE
    1. Http Server (1) Search CVE
      1. 2.2.14
  3. Mozilla (1) Search CVE
    1. Nss (1) Search CVE
      1. 3.12.4
  4. Debian (1) Search CVE
    1. Debian Linux (5) Search CVE
      1. 4.0
      2. 5.0
      3. 6.0
      4. 7.0
      5. 8.0
  5. Microsoft (1) Search CVE
    1. Internet Information Server (1) Search CVE
      1. 7.0
  6. Canonical (1) Search CVE
    1. Ubuntu Linux (6) Search CVE
      1. 8.04
      2. 8.10
      3. 9.04
      4. 9.10
      5. 10.04
      6. 10.10
  7. Gnu (1) Search CVE
    1. Gnutls (1) Search CVE
      1. 2.8.5
  8. Fedoraproject (1) Search CVE
    1. Fedora (4) Search CVE
      1. 11
      2. 12
      3. 13
      4. 14

CWE

ID Name Description Links
CWE-310 Cryptographic Issues Weaknesses in this category are related to the use of cryptography. CVE

References

Source Link
BUGTRAQ http://archives.neohapsis.com/archives/bugtraq/2013-11/0120.html
MISC http://blogs.iss.net/archive/sslmitmiscsrf.html
MISC http://extendedsubset.com/?p=8
MISC http://extendedsubset.com/Renegotiating_TLS.pdf
HP http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02436041
HP http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html
MISC http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html
APPLE http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html
APPLE http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
APPLE http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html
MISC http://clicky.me/tlsvuln
CONFIRM http://kbase.redhat.com/faq/docs/DOC-20491
HP http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01945686
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-26-273350-1
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021653.1-1
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021752.1-1
CONFIRM http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES
CONFIRM http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released
CONFIRM http://sysoev.ru/nginx/patch.cve-2009-3555.txt
CONFIRM http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html
GENTOO http://security.gentoo.org/glsa/glsa-201203-22.xml
HP http://marc.info/?l=bugtraq&m=132077688910227&w=2
OPENBSD http://openbsd.org/errata45.html#010_openssl
MLIST http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2
SUSE http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html
AIXAPAR http://www-01.ibm.com/support/docview.wss?uid=swg1IC67848
HP http://marc.info/?l=bugtraq&m=142660345230545&w=2
GENTOO http://security.gentoo.org/glsa/glsa-200912-01.xml
HP http://marc.info/?l=bugtraq&m=127419602507642&w=2
CONFIRM http://support.apple.com/kb/HT4004
SLACKWARE http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.597446
SUSE http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
OPENBSD http://openbsd.org/errata46.html#004_openssl
CONFIRM http://support.avaya.com/css/P8/documents/100114327
SUSE http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
HP http://marc.info/?l=bugtraq&m=134254866602253&w=2
SUSE http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html
SECTRACK http://securitytracker.com/id?1023148
HP http://marc.info/?l=bugtraq&m=127128920008563&w=2
GENTOO http://security.gentoo.org/glsa/glsa-201406-32.xml
CONFIRM http://support.avaya.com/css/P8/documents/100081611
FULLDISC http://seclists.org/fulldisclosure/2009/Nov/139
SUSE http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
AIXAPAR http://www-01.ibm.com/support/docview.wss?uid=swg1IC68054
SUSE http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
MLIST http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00029.html
CONFIRM http://support.citrix.com/article/CTX123359
HP http://marc.info/?l=bugtraq&m=130497311408250&w=2
UBUNTU http://ubuntu.com/usn/usn-923-1
SUSE http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
HP http://marc.info/?l=bugtraq&m=133469267822771&w=2
CONFIRM http://support.avaya.com/css/P8/documents/100114315
CONFIRM http://wiki.rpath.com/Advisories:rPSA-2009-0155
SUSE http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
CONFIRM http://support.apple.com/kb/HT4170
CONFIRM http://support.apple.com/kb/HT4171
HP http://marc.info/?l=bugtraq&m=127557596201693&w=2
CONFIRM http://www.arubanetworks.com/support/alerts/aid-020810.txt
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2010:076
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2010:089
CONFIRM http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2c
MLIST http://www.openwall.com/lists/oss-security/2009/11/05/5
CERT-VN http://www.kb.cert.org/vuls/id/120541
DEBIAN http://www.debian.org/security/2009/dsa-1934
CONFIRM http://www.openssl.org/news/secadv_20091111.txt
MISC http://www.links.org/?p=780
MISC http://www.links.org/?p=786
CONFIRM http://www.openoffice.org/security/cves/CVE-2009-3555.html
CONFIRM http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html
MLIST http://www.openwall.com/lists/oss-security/2009/11/07/3
CONFIRM http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
CONFIRM http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21426108
CONFIRM http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
MLIST http://www.openwall.com/lists/oss-security/2009/11/06/3
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21432298
CISCO http://www.cisco.com/en/US/products/products_security_advisory09186a0080b01d1d.shtml
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0165.html
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0119.html
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0167.html
DEBIAN http://www.debian.org/security/2011/dsa-2141
MISC http://www.links.org/?p=789
AIXAPAR http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247
AIXAPAR http://www-01.ibm.com/support/docview.wss?uid=swg1IC68055
CONFIRM http://www.mozilla.org/security/announce/2010/mfsa2010-22.html
AIXAPAR http://www-1.ibm.com/support/search.wss?rs=0&q=PM00675&apar=only
CONFIRM http://www.opera.com/docs/changelogs/unix/1060/
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0155.html
MLIST http://www.openwall.com/lists/oss-security/2009/11/23/10
DEBIAN http://www.debian.org/security/2015/dsa-3253
MLIST http://www.ietf.org/mail-archive/web/tls/current/msg03928.html
MLIST http://www.openwall.com/lists/oss-security/2009/11/05/3
MISC http://www.betanews.com/article/1257452450
MLIST http://www.ietf.org/mail-archive/web/tls/current/msg03948.html
MLIST http://www.openwall.com/lists/oss-security/2009/11/20/1
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0130.html
CONFIRM http://www.opera.com/support/search/view/944/
CONFIRM http://www.ingate.com/Relnote.php?ver=481
MISC http://www.tombom.co.uk/blog/?p=85
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0338.html
SECTRACK http://www.securitytracker.com/id?1023213
SECTRACK http://www.securitytracker.com/id?1023204
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0986.html
SECTRACK http://www.securitytracker.com/id?1023210
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0786.html
UBUNTU http://www.ubuntu.com/usn/USN-1010-1
SECTRACK http://www.securitytracker.com/id?1023427
SECTRACK http://www.securitytracker.com/id?1023218
SECTRACK http://www.securitytracker.com/id?1023207
SECTRACK http://www.securitytracker.com/id?1023163
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0865.html
SECTRACK http://www.securitytracker.com/id?1023217
REDHAT http://www.redhat.com/support/errata/RHSA-2011-0880.html
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0768.html
SECTRACK http://www.securitytracker.com/id?1023275
UBUNTU http://www.ubuntu.com/usn/USN-927-1
SECTRACK http://www.securitytracker.com/id?1023271
SECTRACK http://www.securitytracker.com/id?1023274
SECTRACK http://www.securitytracker.com/id?1023214
SECTRACK http://www.securitytracker.com/id?1023212
SECTRACK http://www.securitytracker.com/id?1023215
CERT http://www.us-cert.gov/cas/techalerts/TA10-287A.html
SECTRACK http://www.securitytracker.com/id?1023224
SECTRACK http://www.securitytracker.com/id?1023205
SECTRACK http://www.securitytracker.com/id?1023272
SECTRACK http://www.securitytracker.com/id?1023273
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0337.html
SECTRACK http://www.securitytracker.com/id?1023211
SECTRACK http://www.securitytracker.com/id?1024789
SECTRACK http://www.securitytracker.com/id?1023270
SECTRACK http://www.securitytracker.com/id?1023219
CONFIRM http://www.vmware.com/security/advisories/VMSA-2010-0019.html
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0339.html
SECTRACK http://www.securitytracker.com/id?1023208
SECTRACK http://www.securitytracker.com/id?1023216
SECTRACK http://www.securitytracker.com/id?1023209
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0987.html
UBUNTU http://www.ubuntu.com/usn/USN-927-5
UBUNTU http://www.ubuntu.com/usn/USN-927-4
SECTRACK http://www.securitytracker.com/id?1023243
BID http://www.securityfocus.com/bid/36935
MISC http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html
SECTRACK http://www.securitytracker.com/id?1023411
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0807.html
SECTRACK http://www.securitytracker.com/id?1023428
SECTRACK http://www.securitytracker.com/id?1023426
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0770.html
SECTRACK http://www.securitytracker.com/id?1023206
CERT http://www.us-cert.gov/cas/techalerts/TA10-222A.html
HP http://www.securityfocus.com/archive/1/522176
VUPEN http://www.vupen.com/english/advisories/2009/3164
VUPEN http://www.vupen.com/english/advisories/2009/3165
VUPEN http://www.vupen.com/english/advisories/2009/3205
VUPEN http://www.vupen.com/english/advisories/2009/3220
CONFIRM https://bugzilla.mozilla.org/show_bug.cgi?id=545755
VUPEN http://www.vupen.com/english/advisories/2010/3069
VUPEN http://www.vupen.com/english/advisories/2009/3354
VUPEN http://www.vupen.com/english/advisories/2010/2745
VUPEN http://www.vupen.com/english/advisories/2009/3313
VUPEN http://www.vupen.com/english/advisories/2010/3086
VUPEN http://www.vupen.com/english/advisories/2010/1191
FEDORA https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html
VUPEN http://www.vupen.com/english/advisories/2010/1054
MISC https://bugzilla.mozilla.org/show_bug.cgi?id=526689
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=533125
VUPEN http://www.vupen.com/english/advisories/2011/0032
VUPEN http://www.vupen.com/english/advisories/2009/3521
FEDORA https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html
VUPEN http://www.vupen.com/english/advisories/2010/0916
VUPEN http://www.vupen.com/english/advisories/2011/0086
VUPEN http://www.vupen.com/english/advisories/2010/0982
VUPEN http://www.vupen.com/english/advisories/2010/0848
VUPEN http://www.vupen.com/english/advisories/2010/2010
VUPEN http://www.vupen.com/english/advisories/2010/0933
VUPEN http://www.vupen.com/english/advisories/2010/0994
VUPEN http://www.vupen.com/english/advisories/2010/1350
VUPEN http://www.vupen.com/english/advisories/2010/0748
VUPEN http://www.vupen.com/english/advisories/2009/3484
CONFIRM https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
FEDORA https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00634.html
MISC https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt
MISC https://support.f5.com/kb/en-us/solutions/public/10000/700/sol10737.html
FEDORA https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html
VUPEN http://www.vupen.com/english/advisories/2009/3310
CONFIRM https://kb.bluecoat.com/index?page=content&id=SA50
VUPEN http://www.vupen.com/english/advisories/2011/0033
VUPEN http://www.vupen.com/english/advisories/2009/3587
VUPEN http://www.vupen.com/english/advisories/2010/1639
VUPEN http://www.vupen.com/english/advisories/2010/1793
CONFIRM http://www.vmware.com/security/advisories/VMSA-2011-0003.html
VUPEN http://www.vupen.com/english/advisories/2010/1107
VUPEN http://www.vupen.com/english/advisories/2010/3126
VUPEN http://www.vupen.com/english/advisories/2010/1673
VUPEN http://www.vupen.com/english/advisories/2010/0086
VUPEN http://www.vupen.com/english/advisories/2010/0173
VUPEN http://www.vupen.com/english/advisories/2009/3353
FEDORA https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html
FEDORA https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01020.html
FEDORA https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html
BUGTRAQ http://www.securityfocus.com/archive/1/515055/100/0/threaded
HP http://marc.info/?l=bugtraq&m=126150535619567&w=2
BUGTRAQ http://www.securityfocus.com/archive/1/508130/100/0/threaded
BUGTRAQ http://www.securityfocus.com/archive/1/507952/100/0/threaded
HP http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995
CONFIRM http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
MLIST http://marc.info/?l=cryptography&m=125752275331877&w=2
BUGTRAQ http://www.securityfocus.com/archive/1/508075/100/0/threaded
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/54158
MISC http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html
FEDORA https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01029.html
CONFIRM http://support.avaya.com/css/P8/documents/100070150
MISC http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg24006386
BUGTRAQ http://www.securityfocus.com/archive/1/516397/100/0/threaded
CONFIRM http://blogs.sun.com/security/entry/vulnerability_in_tls_protocol_during
SUSE http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg24025312
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049
MLIST https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@%3Cdev.tomcat.apache.org%3E
MLIST https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@%3Cdev.tomcat.apache.org%3E

History of changes

Date Event
2019-07-03 17:25
2019-03-25 11:31
2019-03-21 15:43
2018-10-12 21:52
2018-10-11 14:46
2018-10-10 19:43
2017-08-17 06:13
2009-11-09 17:30

New CVE