Количество 18
Количество 18

CVE-2016-0703
The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

CVE-2016-0703
The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

CVE-2016-0703
The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
CVE-2016-0703
The get_client_master_key function in s2_srvr.c in the SSLv2 implement ...
GHSA-jqfv-c9gp-wf8f
The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

BDU:2016-00629
Уязвимость функции get_client_master_key реализации SSLv2 библиотеки OpenSSL, позволяющая нарушителю раскрыть защищаемую информацию
ELSA-2016-0372
ELSA-2016-0372: openssl098e security update (IMPORTANT)

SUSE-SU-2016:0631-1
Security update for compat-openssl097g

openSUSE-SU-2016:0720-1
Security update for openssl

SUSE-SU-2016:0641-1
Security update for openssl

SUSE-SU-2016:0624-1
Security update for openssl

openSUSE-SU-2016:0628-1
Security update for openssl

SUSE-SU-2016:0621-1
Security update for openssl

SUSE-SU-2016:0620-1
Security update for openssl

SUSE-SU-2016:0617-1
Security update for openssl

SUSE-SU-2016:0748-1
Security update for sles12sp1-docker-image

SUSE-SU-2016:0778-1
Security update for sles11sp4-docker-image

SUSE-SU-2016:0786-1
Security update for sles12-docker-image
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2016-0703 The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800. | CVSS3: 5.9 | 6% Низкий | больше 9 лет назад |
![]() | CVE-2016-0703 The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800. | CVSS2: 4.3 | 6% Низкий | больше 9 лет назад |
![]() | CVE-2016-0703 The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800. | CVSS3: 5.9 | 6% Низкий | больше 9 лет назад |
CVE-2016-0703 The get_client_master_key function in s2_srvr.c in the SSLv2 implement ... | CVSS3: 5.9 | 6% Низкий | больше 9 лет назад | |
GHSA-jqfv-c9gp-wf8f The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800. | CVSS3: 5.9 | 6% Низкий | около 3 лет назад | |
![]() | BDU:2016-00629 Уязвимость функции get_client_master_key реализации SSLv2 библиотеки OpenSSL, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.9 | 6% Низкий | больше 9 лет назад |
ELSA-2016-0372 ELSA-2016-0372: openssl098e security update (IMPORTANT) | больше 9 лет назад | |||
![]() | SUSE-SU-2016:0631-1 Security update for compat-openssl097g | больше 9 лет назад | ||
![]() | openSUSE-SU-2016:0720-1 Security update for openssl | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0641-1 Security update for openssl | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0624-1 Security update for openssl | больше 9 лет назад | ||
![]() | openSUSE-SU-2016:0628-1 Security update for openssl | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0621-1 Security update for openssl | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0620-1 Security update for openssl | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0617-1 Security update for openssl | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0748-1 Security update for sles12sp1-docker-image | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0778-1 Security update for sles11sp4-docker-image | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0786-1 Security update for sles12-docker-image | больше 9 лет назад |
Уязвимостей на страницу