Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-0704

Опубликовано: 01 мар. 2016
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

It was discovered that the SSLv2 protocol implementation in OpenSSL did not properly implement the Bleichenbacher protection for export cipher suites. An attacker could use a SSLv2 server using OpenSSL as a Bleichenbacher oracle.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5openssl097aWill not fix
Red Hat JBoss Enterprise Application Platform 6opensslUnder investigation
Red Hat JBoss Enterprise Web Server 1opensslUnder investigation
Red Hat JBoss Enterprise Web Server 2opensslUnder investigation
Red Hat JBoss Enterprise Web Server 3opensslUnder investigation
Red Hat Enterprise Linux 4 Extended Lifecycle SupportopensslFixedRHSA-2016:030601.03.2016
Red Hat Enterprise Linux 5opensslFixedRHSA-2015:080013.04.2015
Red Hat Enterprise Linux 5.6 Long LifeopensslFixedRHSA-2016:030401.03.2016
Red Hat Enterprise Linux 5.9 Long LifeopensslFixedRHSA-2016:030401.03.2016
Red Hat Enterprise Linux 6opensslFixedRHSA-2015:071523.03.2015

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1310814openssl: SSLv2 Bleichenbacher protection overwrites wrong bytes for export ciphers

EPSS

Процентиль: 93%
0.09786
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 9 лет назад

An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

CVSS3: 5.9
nvd
больше 9 лет назад

An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

CVSS3: 5.9
debian
больше 9 лет назад

An oracle protection mechanism in the get_client_master_key function i ...

CVSS3: 5.9
github
около 3 лет назад

An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

fstec
больше 9 лет назад

Уязвимость библиотеки OpenSSL, позволяющая нарушителю расшифровать данные

EPSS

Процентиль: 93%
0.09786
Низкий

4.3 Medium

CVSS2