Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2003-0078 | First vendor Publication | 2003-03-03 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0078 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-203 | Information Exposure Through Discrepancy |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 253-1 (openssl) File : nvt/deb_253_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
3945 | OpenSSL Vaudenay Timing Attack OpenSSL versions 0.9.6h and prior and 0.9.7 contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a repeated block of plaintext in multiple OpenSSL/TLS sessions occur. A crafted block of ciphertext can be repeatedly injected into each session, which will kill that session but may ultimately lead to the disclosure of the repeated plaintext block, resulting in a loss of confidentiality. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_28686.nasl - Type : ACT_GATHER_INFO |
2005-02-16 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_28685.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-253.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-020.nasl - Type : ACT_GATHER_INFO |
2004-07-25 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2003_011.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-063.nasl - Type : ACT_GATHER_INFO |
2003-02-20 | Name : The remote host has an application that is affected by multiple vulnerabilities. File : openssl_password_interception.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:35 |
|
2024-11-28 12:05:30 |
|
2024-08-02 12:02:26 |
|
2024-08-02 01:01:24 |
|
2024-02-14 21:28:28 |
|
2024-02-02 01:02:13 |
|
2024-02-01 12:01:26 |
|
2023-09-05 12:02:07 |
|
2023-09-05 01:01:17 |
|
2023-09-02 12:02:08 |
|
2023-09-02 01:01:17 |
|
2023-08-12 12:02:36 |
|
2023-08-12 01:01:17 |
|
2023-08-11 12:02:13 |
|
2023-08-11 01:01:19 |
|
2023-08-06 12:02:03 |
|
2023-08-06 01:01:18 |
|
2023-08-04 12:02:06 |
|
2023-08-04 01:01:18 |
|
2023-07-14 12:02:05 |
|
2023-07-14 01:01:18 |
|
2023-03-29 01:02:03 |
|
2023-03-28 12:01:23 |
|
2022-10-11 12:01:51 |
|
2022-10-11 01:01:11 |
|
2021-05-04 12:02:00 |
|
2021-04-22 01:02:06 |
|
2020-05-23 00:15:20 |
|
2019-03-19 12:01:35 |
|
2016-10-18 12:01:08 |
|
2016-06-28 15:01:44 |
|
2014-02-17 10:25:47 |
|
2013-05-11 11:50:27 |
|