结构: Simple
Abstraction: Variant
状态: Draft
被利用可能性: unkown
The software modifies the SSL context after connection creation has begun.
If the program modifies the SSL_CTX object after creating SSL objects from it, there is the possibility that older SSL objects created from the original context could all be affected by that change.
cwe_Nature: ChildOf cwe_CWE_ID: 666 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 287 cwe_View_ID: 1000
cwe_Nature: ChildOf cwe_CWE_ID: 287 cwe_View_ID: 699 cwe_Ordinal: Primary
范围 | 影响 | 注释 |
---|---|---|
Access Control | Bypass Protection Mechanism | No authentication takes place in this process, bypassing an assumed protection of encryption. |
Confidentiality | Read Application Data | The encrypted communication between a user and a trusted host may be subject to a "man in the middle" sniffing attack. |
策略:
Use a language or a library that provides a cryptography framework at a higher level of abstraction.
策略:
Most SSL_CTX functions have SSL counterparts that act on SSL-type objects.
策略:
Applications should set up an SSL_CTX completely, before creating SSL objects from it.
The following example demonstrates the weakness.
bad C