Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-4576

Опубликовано: 04 янв. 2012
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 3opensslWill not fix
Red Hat Enterprise Linux 4openssl096bWill not fix
Red Hat Enterprise Linux 5openssl097aWill not fix
Red Hat Enterprise Linux 6openssl098eWill not fix
Red Hat Enterprise Linux 4opensslFixedRHSA-2012:008601.02.2012
Red Hat Enterprise Linux 5opensslFixedRHSA-2012:006024.01.2012
Red Hat Enterprise Linux 6opensslFixedRHSA-2012:005924.01.2012
Red Hat JBoss Enterprise Application Platform 5.1FixedRHSA-2012:130724.09.2012
Red Hat JBoss Enterprise Application Platform 6.0FixedRHSA-2012:130824.09.2012
Red Hat JBoss Web Server 1.0FixedRHSA-2012:130624.09.2012

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=771775openssl: uninitialized SSL 3.0 padding

EPSS

Процентиль: 80%
0.01427
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 13 лет назад

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

nvd
больше 13 лет назад

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

debian
больше 13 лет назад

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0 ...

github
больше 3 лет назад

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.

oracle-oval
больше 13 лет назад

ELSA-2012-0060: openssl security update (MODERATE)

EPSS

Процентиль: 80%
0.01427
Низкий

4.3 Medium

CVSS2