Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fqw2-3v24-gc79

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.9

Описание

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

Ссылки

EPSS

Процентиль: 100%
0.89994
Высокий

5.9 Medium

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 10 лет назад

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

redhat
почти 10 лет назад

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

CVSS3: 5.9
nvd
почти 10 лет назад

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

CVSS3: 5.9
debian
почти 10 лет назад

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before ...

fstec
почти 10 лет назад

Уязвимость библиотеки OpenSSL, позволяющая нарушителю расшифровать передаваемые данные

EPSS

Процентиль: 100%
0.89994
Высокий

5.9 Medium

CVSS3

Дефекты

CWE-200