Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-0703

Опубликовано: 01 мар. 2016
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

It was discovered that the SSLv2 servers using OpenSSL accepted SSLv2 connection handshakes that indicated non-zero clear key length for non-export cipher suites. An attacker could use this flaw to decrypt recorded SSLv2 sessions with the server by using it as a decryption oracle.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5openssl097aWill not fix
Red Hat JBoss Enterprise Application Platform 6opensslUnder investigation
Red Hat JBoss Enterprise Web Server 1opensslUnder investigation
Red Hat JBoss Enterprise Web Server 2opensslUnder investigation
Red Hat JBoss Enterprise Web Server 3opensslUnder investigation
Red Hat Enterprise Linux 4 Extended Lifecycle SupportopensslFixedRHSA-2016:030601.03.2016
Red Hat Enterprise Linux 5opensslFixedRHSA-2015:080013.04.2015
Red Hat Enterprise Linux 5.6 Long LifeopensslFixedRHSA-2016:030401.03.2016
Red Hat Enterprise Linux 5.9 Long LifeopensslFixedRHSA-2016:030401.03.2016
Red Hat Enterprise Linux 6opensslFixedRHSA-2015:071523.03.2015

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1310811openssl: Divide-and-conquer session key recovery in SSLv2

EPSS

Процентиль: 90%
0.05989
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 9 лет назад

The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

CVSS3: 5.9
nvd
больше 9 лет назад

The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

CVSS3: 5.9
debian
больше 9 лет назад

The get_client_master_key function in s2_srvr.c in the SSLv2 implement ...

CVSS3: 5.9
github
около 3 лет назад

The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

CVSS3: 5.9
fstec
больше 9 лет назад

Уязвимость функции get_client_master_key реализации SSLv2 библиотеки OpenSSL, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 90%
0.05989
Низкий

4.3 Medium

CVSS2