Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-1968

Опубликовано: 09 сент. 2020
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3
CVSS3: 3.7

Описание

The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).

РелизСтатусПримечание
bionic

not-affected

uses openssl 1.1.0
devel

not-affected

uses openssl 1.1.1
esm-apps/bionic

not-affected

uses openssl 1.1.0
esm-apps/xenial

needed

esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

uses openssl 1.1.1
focal

not-affected

uses openssl 1.1.1
groovy

not-affected

uses openssl 1.1.1
hirsute

not-affected

uses openssl 1.1.1
impish

not-affected

uses openssl 1.1.1

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl1.1
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl1.1
esm-apps/jammy

not-affected

uses openssl 1.1
esm-apps/noble

not-affected

uses system openssl1.1
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl1.1
groovy

not-affected

uses system openssl1.1

Показывать по

РелизСтатусПримечание
bionic

not-affected

1.1.1-1ubuntu2.1~18.04.6
devel

not-affected

1.1.1f-1ubuntu3
esm-infra-legacy/trusty

released

1.0.1f-1ubuntu2.27+esm10
esm-infra/bionic

not-affected

1.1.1-1ubuntu2.1~18.04.6
esm-infra/focal

not-affected

1.1.1f-1ubuntu2
esm-infra/xenial

released

1.0.2g-1ubuntu4.17
fips-preview/jammy

not-affected

1.1.1f-1ubuntu3
fips-updates/bionic

not-affected

1.1.1-1ubuntu2.1~18.04.6
fips-updates/focal

not-affected

1.1.1f-1ubuntu2
fips-updates/jammy

not-affected

1.1.1f-1ubuntu3

Показывать по

РелизСтатусПримечание
bionic

released

1.0.2n-1ubuntu5.4
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

1.0.2n-1ubuntu5.4
esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

Показывать по

EPSS

Процентиль: 74%
0.00844
Низкий

4.3 Medium

CVSS2

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
больше 5 лет назад

The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).

CVSS3: 3.7
nvd
больше 5 лет назад

The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).

CVSS3: 3.7
debian
больше 5 лет назад

The Raccoon attack exploits a flaw in the TLS specification which can ...

suse-cvrf
больше 5 лет назад

Security update for openssl1

suse-cvrf
больше 5 лет назад

Security update for openssl

EPSS

Процентиль: 74%
0.00844
Низкий

4.3 Medium

CVSS2

3.7 Low

CVSS3