OpenSSL Session Reuse Bypass of Client Certificate Access Control
Local Access Required,
Remote / Network Access
Loss of Confidentiality
The cacheing mechanisms in OpenSSL and SSLeay versions prior to 0.9.2b may allow unauthorized session reuse by a malicious client, potentially allowing the bypass of client-based certificate authentication mechanisms.
Upgrade to version 0.9.2b or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.