As per OpenSSL upstream: A malicious client can negotiate SSLv2 ciphers that have been disabled on the server and complete SSLv2 handshakes even if all SSLv2 ciphers have been disabled, provided that the SSLv2 protocol was not also disabled via SSL_OP_NO_SSLv2. This issue affects OpenSSL versions 1.0.2, 1.0.1. OpenSSL 1.0.2 users should upgrade to 1.0.2f OpenSSL 1.0.1 users should upgrade to 1.0.1r This issue was reported to OpenSSL on 26th December 2015 by Nimrod Aviram and Sebastian Schinzel. The fix was developed by Nimrod Aviram with further development by Viktor Dukhovni of the OpenSSL development team. Acknowledgements: Name: the OpenSSL project Upstream: Nimrod Aviram, Sebastian Schinzel
Statement: This security flaw can only be exploited when a malicious client negotiates SSLv2 ciphers and completes a SSLv2 handshake. This flaw cannot be actively exploited by a Man-In-The-Middle attacker. All versions of OpenSSL shipped with Red Hat Enterprise Linux enable SSLv2 protocol, but disable SSLv2 ciphers by default (in Red Hat Enterprise Linux 6 and later), therefore are vulnerable to this flaw. Red Hat Product Security has rated this issue as having Low security impact, a future update may address this flaw. SSLv2 suffers from a number of security flaws allowing attackers to capture and alter information passed between a client and the server. Therefore we strongly recommend that SSLv2 should be disabled on all the SSL/TLS servers.
Public via: External References: https://www.openssl.org/news/secadv/20160128.txt
Created openssl101e tracking bugs for this issue: Affects: epel-5 [bug 1302769]
Created openssl tracking bugs for this issue: Affects: fedora-all [bug 1302767]
Created mingw-openssl tracking bugs for this issue: Affects: fedora-all [bug 1302768]
openssl-1.0.2f-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
Upstream commit: https://git.openssl.org/?p=openssl.git;a=commitdiff;h=4040a7fd104b412bd446338c6c28a62eb7d8e852
This issue has been addressed in the following products: Red Hat Enterprise Linux 4 Extended Lifecycle Support Via RHSA-2016:0306 https://rhn.redhat.com/errata/RHSA-2016-0306.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 5.6 Long Life Red Hat Enterprise Linux 5.9 Long Life Via RHSA-2016:0304 https://rhn.redhat.com/errata/RHSA-2016-0304.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.2 Advanced Update Support Red Hat Enterprise Linux 6.5 Advanced Update Support Red Hat Enterprise Linux 6.4 Advanced Update Support Via RHSA-2016:0303 https://rhn.redhat.com/errata/RHSA-2016-0303.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2016:0302 https://rhn.redhat.com/errata/RHSA-2016-0302.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.1 Extended Update Support Red Hat Enterprise Linux 6.6 Extended Update Support Via RHSA-2016:0305 https://rhn.redhat.com/errata/RHSA-2016-0305.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2016:0301 https://rhn.redhat.com/errata/RHSA-2016-0301.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2016:0372 https://rhn.redhat.com/errata/RHSA-2016-0372.html
This issue has been addressed in the following products: RHEV-H and Agents for RHEL-6 RHEV-H and Agents for RHEL-7 Via RHSA-2016:0379 https://rhn.redhat.com/errata/RHSA-2016-0379.html
This issue has been addressed in the following products: JBoss Web Server 2.1.0 Via RHSA-2016:0445 https://rhn.redhat.com/errata/RHSA-2016-0445.html
This issue has been addressed in the following products: JBoss Web Server 3.0.2 Via RHSA-2016:0446 https://rhn.redhat.com/errata/RHSA-2016-0446.html
openssl101e-1.0.1e-7.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products: JBoss Enterprise Application Platform 6.4.6 Via RHSA-2016:0490 https://rhn.redhat.com/errata/RHSA-2016-0490.html