CVE-2003-0078

Current Description

ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."

Basic Data

PublishedMarch 03, 2003
Last ModifiedOctober 18, 2016
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationOpensslOpenssl0.9.1c*******
    2.3ApplicationOpensslOpenssl0.9.2b*******
    2.3ApplicationOpensslOpenssl0.9.3*******
    2.3ApplicationOpensslOpenssl0.9.4*******
    2.3ApplicationOpensslOpenssl0.9.5*******
    2.3ApplicationOpensslOpenssl0.9.5a*******
    2.3ApplicationOpensslOpenssl0.9.6*******
    2.3ApplicationOpensslOpenssl0.9.6a*******
    2.3ApplicationOpensslOpenssl0.9.6b*******
    2.3ApplicationOpensslOpenssl0.9.6c*******
    2.3ApplicationOpensslOpenssl0.9.6d*******
    2.3ApplicationOpensslOpenssl0.9.6e*******
    2.3ApplicationOpensslOpenssl0.9.6g*******
    2.3ApplicationOpensslOpenssl0.9.6h*******
    2.3ApplicationOpensslOpenssl0.9.7*******
    2.3ApplicationOpensslOpenssl0.9.7beta1******
    2.3ApplicationOpensslOpenssl0.9.7beta2******
    2.3ApplicationOpensslOpenssl0.9.7beta3******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSFreebsdFreebsd4.2*******
    2.3OSFreebsdFreebsd4.3*******
    2.3OSFreebsdFreebsd4.4*******
    2.3OSFreebsdFreebsd4.5*******
    2.3OSFreebsdFreebsd4.6*******
    2.3OSFreebsdFreebsd4.7*******
    2.3OSFreebsdFreebsd4.8pre-release******
    2.3OSFreebsdFreebsd5.0*******
    2.3OSOpenbsdOpenbsd3.1*******
    2.3OSOpenbsdOpenbsd3.2*******

Vulnerable Software List

VendorProductVersions
Freebsd Freebsd 4.2, 4.3, 4.4, 4.5, 4.6, 4.7, 4.8, 5.0
Openbsd Openbsd 3.1, 3.2
Openssl Openssl 0.9.1c, 0.9.2b, 0.9.3, 0.9.4, 0.9.5, 0.9.5a, 0.9.6, 0.9.6a, 0.9.6b, 0.9.6c, 0.9.6d, 0.9.6e, 0.9.6g, 0.9.6h, 0.9.7

References

NameSourceURLTags
NetBSD-SA2003-001ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-001.txt.ascNETBSD
20030501-01-Iftp://patches.sgi.com/support/free/security/advisories/20030501-01-ISGI
CLSA-2003:570http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000570CONECTIVA
20030219 OpenSSL 0.9.7a and 0.9.6i releasedhttp://marc.info/?l=bugtraq&m=104567627211904&w=2BUGTRAQ
20030219 [OpenPKG-SA-2003.013] OpenPKG Security Advisory (openssl)http://marc.info/?l=bugtraq&m=104568426824439&w=2BUGTRAQ
GLSA-200302-10http://marc.info/?l=bugtraq&m=104577183206905&w=2GENTOO
N-051http://www.ciac.org/ciac/bulletins/n-051.shtmlCIAC
DSA-253http://www.debian.org/security/2003/dsa-253DEBIANVendor Advisory
ssl-cbc-information-leak(11369)http://www.iss.net/security_center/static/11369.phpXFVendor Advisory
ESA-20030220-005http://www.linuxsecurity.com/advisories/engarde_advisory-2874.htmlENGARDE
MDKSA-2003:020http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:020MANDRAKE
http://www.openssl.org/news/secadv_20030219.txthttp://www.openssl.org/news/secadv_20030219.txtCONFIRMPatch Vendor Advisory
3945http://www.osvdb.org/3945OSVDB
RHSA-2003:062http://www.redhat.com/support/errata/RHSA-2003-062.htmlREDHAT
RHSA-2003:063http://www.redhat.com/support/errata/RHSA-2003-063.htmlREDHAT
RHSA-2003:082http://www.redhat.com/support/errata/RHSA-2003-082.htmlREDHAT
RHSA-2003:104http://www.redhat.com/support/errata/RHSA-2003-104.htmlREDHAT
RHSA-2003:205http://www.redhat.com/support/errata/RHSA-2003-205.htmlREDHAT
6884http://www.securityfocus.com/bid/6884BID
2003-0005http://www.trustix.org/errata/2003/0005TRUSTIX