CVE-2016-0703

The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

Published date
2016-03-02T11:59Z
Last modification date
2022-12-13T12:15Z
Assigner
secalert@redhat.com
Problem type
CWE-200

Impact

CVSS v3 vector string
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
NameURLSourceTags
https://drownattack.comhttps://drownattack.comMISC
https://git.openssl.org/?p=openssl.git;a=commit;h=ae50d8270026edf5b3c7f8aaa0c6677462b33d97https://git.openssl.org/?p=openssl.git;a=commit;h=ae50d8270026edf5b3c7f8aaa0c6677462b33d97CONFIRM
http://openssl.org/news/secadv/20160301.txthttp://openssl.org/news/secadv/20160301.txtCONFIRMVendor Advisory
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441CONFIRM
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlCONFIRM
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlCONFIRM
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlCONFIRM
83743http://www.securityfocus.com/bid/83743BID
SUSE-SU-2016:0624http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.htmlSUSE
openSUSE-SU-2016:0720http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.htmlSUSE
https://www.openssl.org/news/secadv/20160301.txthttps://www.openssl.org/news/secadv/20160301.txtCONFIRM
SUSE-SU-2016:0620http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.htmlSUSE
SUSE-SU-2016:0621http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.htmlSUSE
openSUSE-SU-2016:0638http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.htmlSUSE
openSUSE-SU-2016:0628http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.htmlSUSE
SUSE-SU-2016:0631http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.htmlSUSE
20160302 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-opensslCISCO
SUSE-SU-2016:1057http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.htmlSUSE
openSUSE-SU-2016:0637http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.htmlSUSE
SUSE-SU-2016:0641http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.htmlSUSE
SUSE-SU-2016:0617http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.htmlSUSE
SUSE-SU-2016:0678http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.htmlSUSE
GLSA-201603-15https://security.gentoo.org/glsa/201603-15GENTOO
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759CONFIRM
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_ushttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_usCONFIRM
1035133http://www.securitytracker.com/id/1035133SECTRACK
FreeBSD-SA-16:12https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.ascFREEBSD
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlCONFIRM
https://www.arista.com/en/support/advisories-notices/security-advisories/1260-security-advisory-18https://www.arista.com/en/support/advisories-notices/security-advisories/1260-security-advisory-18MISC
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfhttps://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfCONFIRM