aboutsummaryrefslogtreecommitdiff
path: root/crypto
diff options
context:
space:
mode:
authorColin Percival <cperciva@FreeBSD.org>2005-10-11 11:53:03 +0000
committerColin Percival <cperciva@FreeBSD.org>2005-10-11 11:53:03 +0000
commit2e78fee2396410636caecd5addac787230a1efc2 (patch)
tree3d0abfb131498adf84009eaeee33a8015e24de38 /crypto
parentd46bcf33415389d35b078df182daea295fdde2e0 (diff)
Correct a man-in-the-middle SSL version rollback vulnerability.
Security: FreeBSD-SA-05:21.openssl Approved by: re@ (scottl)
Notes
Notes: svn path=/stable/6/; revision=151237
Diffstat (limited to 'crypto')
-rw-r--r--crypto/openssl/crypto/opensslv.h4
-rw-r--r--crypto/openssl/ssl/s23_srvr.c7
2 files changed, 3 insertions, 8 deletions
diff --git a/crypto/openssl/crypto/opensslv.h b/crypto/openssl/crypto/opensslv.h
index acb4584869bc..d4cf38eecc29 100644
--- a/crypto/openssl/crypto/opensslv.h
+++ b/crypto/openssl/crypto/opensslv.h
@@ -27,9 +27,9 @@
*/
#define OPENSSL_VERSION_NUMBER 0x0090705FL
#ifdef OPENSSL_FIPS
-#define OPENSSL_VERSION_TEXT "OpenSSL 0.9.7e-fips 25 Oct 2004"
+#define OPENSSL_VERSION_TEXT "OpenSSL 0.9.7e-fips-p1 25 Oct 2004"
#else
-#define OPENSSL_VERSION_TEXT "OpenSSL 0.9.7e 25 Oct 2004"
+#define OPENSSL_VERSION_TEXT "OpenSSL 0.9.7e-p1 25 Oct 2004"
#endif
#define OPENSSL_VERSION_PTEXT " part of " OPENSSL_VERSION_TEXT
diff --git a/crypto/openssl/ssl/s23_srvr.c b/crypto/openssl/ssl/s23_srvr.c
index c5404ca0bcd4..5139477eb780 100644
--- a/crypto/openssl/ssl/s23_srvr.c
+++ b/crypto/openssl/ssl/s23_srvr.c
@@ -268,9 +268,6 @@ int ssl23_get_client_hello(SSL *s)
int n=0,j;
int type=0;
int v[2];
-#ifndef OPENSSL_NO_RSA
- int use_sslv2_strong=0;
-#endif
if (s->state == SSL23_ST_SR_CLNT_HELLO_A)
{
@@ -519,9 +516,7 @@ int ssl23_get_client_hello(SSL *s)
}
s->state=SSL2_ST_GET_CLIENT_HELLO_A;
- if ((s->options & SSL_OP_MSIE_SSLV2_RSA_PADDING) ||
- use_sslv2_strong ||
- (s->options & SSL_OP_NO_TLSv1 && s->options & SSL_OP_NO_SSLv3))
+ if (s->options & SSL_OP_NO_TLSv1 && s->options & SSL_OP_NO_SSLv3)
s->s2->ssl2_rollback=0;
else
/* reject SSL 2.0 session if client supports SSL 3.0 or TLS 1.0