<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri","sans-serif";
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri","sans-serif";}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal>SSL/TLS MITM vulnerability (CVE-2014-0224)<o:p></o:p></p><p class=MsoNormal>===========================================<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><a href="http://www.openssl.org/news/secadv_20140605.txt">http://www.openssl.org/news/secadv_20140605.txt</a> <o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>An attacker using a carefully crafted handshake can force the use of weak<o:p></o:p></p><p class=MsoNormal>keying material in OpenSSL SSL/TLS clients and servers. This can be exploited<o:p></o:p></p><p class=MsoNormal>by a Man-in-the-middle (MITM) attack where the attacker can decrypt and <o:p></o:p></p><p class=MsoNormal>modify traffic from the attacked client and server.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>The attack can only be performed between a vulnerable client *and*<o:p></o:p></p><p class=MsoNormal>server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers<o:p></o:p></p><p class=MsoNormal>are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users<o:p></o:p></p><p class=MsoNormal>of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za.<o:p></o:p></p><p class=MsoNormal>OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m.<o:p></o:p></p><p class=MsoNormal>OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Best, Stephen<o:p></o:p></p></div></body></html>