Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-4576

Опубликовано: 06 янв. 2012
Источник: debian
EPSS Низкий

Описание

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensslfixed1.0.0f-1package

EPSS

Процентиль: 80%
0.01427
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

redhat
больше 13 лет назад

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

nvd
больше 13 лет назад

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

github
больше 3 лет назад

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

oracle-oval
больше 13 лет назад

ELSA-2012-0060: openssl security update (MODERATE)

EPSS

Процентиль: 80%
0.01427
Низкий