SSL: Key Renegotiation
This protocol anomaly triggers when it detects SSL renegotiation. SSL renegotiation is a new SSL handshake in an established SSL session (with the existing tcp connection). It is encrypted and sent over an existing SSL session. Renegotiation is useful when either/both of the participants want to use different set of keys or hash algorithms and for client authentication over secure connections. According to the 2009 OpenSSL source change log (11/05/2009): Disabling renegotiation completely fixes a severe security problem (CVE-2009-3555), but at the cost of breaking all renegotiations.
Extended Description
Multiple vendors' TLS protocol implementations are prone to a security vulnerability related to the session-renegotiation process. Successful exploits of this issue may allow attackers to perform limited man-in-the-middle attacks against vulnerable applications. Note that this issue does not allow attackers to decrypt encrypted data.
Affected Products
Cisco wireless_lan_control,Sun java_system_web_server,Opera_software opera_web_browser
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Blue_coat_systems
Balabit
Sun
Gnu
Oracle
Slackware
Openvpn
Apache_software_foundation
Proftpd_project
Gentoo
Opera_software
Hp
Mozilla
Avaya
Ingate
Openoffice
Pardus
Ubuntu
Novell
Debian
Openssl_project
Voodoo_circle
Linksys
Ibm
Aruba_networks
Zeus_technology
Freebsd
Mandriva
Suse
Microsoft
F5
Red_hat
Research_in_motion
Cisco
Apple
Matrixssl
Rpath
Turbolinux
Hitachi
Innominate
Bsd_perimeter
Citrix
Netbsd
Vmware
5.8