The ssl_parse_client_key_exchange function in XySSL before 0.9 does not protect against certain Bleichenbacher attacks using chosen ciphertext, which allows remote attackers to recover keys via unspecified vectors.Referenceshttp://www.vupen.com/english/advisories/2008/0917/referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/41253http://polarssl.org/?archive#001c