A weakness has been reported in MatrixSSL, which can be exploited by malicious people to disclose potentially sensitive information and hijack a user's session.
The weakness is caused due to a design error in the Secure Sockets Layer 3.0 (SSL) and Transport Layer Security 1.0 (TLS) protocols when selecting a Initialization Vector (IV) used with symmetric cipher suites in CBC mode (e.g. AES). This can be exploited to conduct a chosen-plaintext attack which would allow the decryption of e.g HTTPS sessions via a Man-in-the-Middle (MitM) attack.
The weakness is reported in versions prior to 3.2.2.
Solution: Update to version 3.2.2 and use the "USE_BEAST_WORKAROUND" compile time define (default).
Provided and/or discovered by: Reported by Thai Duong and Juliano Rizzo.
Original Advisory: MatrixSSL:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com