Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cr84-m7vr-7v6v

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

EPSS

Процентиль: 80%
0.01427
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

redhat
больше 13 лет назад

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

nvd
больше 13 лет назад

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

debian
больше 13 лет назад

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0 ...

oracle-oval
больше 13 лет назад

ELSA-2012-0060: openssl security update (MODERATE)

EPSS

Процентиль: 80%
0.01427
Низкий