Matt Caswell e1b568dd24 Prevent handshake with unseeded PRNG
Fix security issue where under certain conditions a client can complete a
handshake with an unseeded PRNG. The conditions are:
- Client is on a platform where the PRNG has not been seeded, and the
user has not seeded manually
- A protocol specific client method version has been used (i.e. not
SSL_client_methodv23)
- A ciphersuite is used that does not require additional random data
from the PRNG beyond the initial ClientHello client random
(e.g. PSK-RC4-SHA)

If the handshake succeeds then the client random that has been used will
have been generated from a PRNG with insufficient entropy and therefore
the output may be predictable.

For example using the following command with an unseeded openssl will
succeed on an unpatched platform:

openssl s_client -psk 1a2b3c4d -tls1_2 -cipher PSK-RC4-SHA

CVE-2015-0285

Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-03-10 10:42:42 +00:00
..
2015-02-06 10:52:12 -05:00
2015-03-09 10:51:57 +00:00
2015-02-06 10:52:12 -05:00
2015-03-05 09:25:53 +00:00
2015-02-06 10:52:12 -05:00
2015-02-26 23:27:09 +00:00
2015-02-27 20:29:03 +00:00
2012-07-05 13:20:19 +00:00
2015-02-06 10:52:12 -05:00
2015-01-22 09:20:09 +00:00
2015-01-12 10:28:05 -05:00
2015-01-27 12:34:45 -05:00
2015-03-10 10:42:42 +00:00
2015-01-22 09:20:10 +00:00
2015-03-05 09:25:53 +00:00
2015-02-27 15:09:02 +00:00
2015-02-06 10:52:12 -05:00
2015-02-06 10:52:12 -05:00
2015-01-22 09:20:09 +00:00
2015-01-22 09:20:09 +00:00
2015-01-22 09:20:09 +00:00
2015-01-27 12:34:45 -05:00
2015-02-06 10:52:12 -05:00
2015-01-30 14:43:57 +01:00
2015-02-27 15:09:28 +00:00
2015-01-28 15:37:16 -05:00
2015-02-06 10:52:12 -05:00
2015-02-06 10:52:12 -05:00