OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Session Resume Ciphersuite Downgrade Issue
Medium Nessus Plugin ID 51892
SynopsisThe remote host allows resuming SSL sessions with a weaker cipher than the one originally negotiated.
DescriptionThe version of OpenSSL on the remote host has been shown to allow resuming session with a weaker cipher than was used when the session was initiated. This means that an attacker that sees (i.e., by sniffing) the start of an SSL connection can manipulate the OpenSSL session cache to cause subsequent resumptions of that session to use a weaker cipher chosen by the attacker.
Note that other SSL implementations may also be affected by this vulnerability.
SolutionUpgrade to OpenSSL 0.9.8q / 1.0.0.c or later, or contact your vendor for a patch.