Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-0736

Опубликовано: 27 июл. 2017
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5
CVSS3: 7.5

Описание

In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.

РелизСтатусПримечание
devel

not-affected

2.4.25-3ubuntu2
esm-infra-legacy/trusty

released

2.4.7-1ubuntu4.15
esm-infra/xenial

released

2.4.18-2ubuntu3.2
precise

not-affected

2.2.22-1ubuntu1.11
trusty

released

2.4.7-1ubuntu4.15
trusty/esm

released

2.4.7-1ubuntu4.15
upstream

released

2.4.25-1
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

released

2.4.18-2ubuntu3.2

Показывать по

EPSS

Процентиль: 97%
0.31844
Средний

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.4
redhat
почти 9 лет назад

In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.

CVSS3: 7.5
nvd
больше 8 лет назад

In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.

CVSS3: 7.5
debian
больше 8 лет назад

In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was ...

CVSS3: 7.5
github
больше 3 лет назад

In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.

fstec
больше 8 лет назад

Уязвимость модуля mod_session_crypto веб-сервера Apache HTTP Server, позволяющая нарушителю осуществить атаки типа Padding Oracle

EPSS

Процентиль: 97%
0.31844
Средний

5 Medium

CVSS2

7.5 High

CVSS3