CVE-2016-0800

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

Published date
2016-03-01T20:59Z
Last modification date
2022-12-13T12:15Z
Assigner
secalert@redhat.com
Problem type
CWE-310

Impact

CVSS v3 vector string
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
NameURLSourceTags
https://drownattack.comhttps://drownattack.comMISC
https://access.redhat.com/security/vulnerabilities/drownhttps://access.redhat.com/security/vulnerabilities/drownCONFIRM
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlCONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlCONFIRM
RHSA-2016:1519http://rhn.redhat.com/errata/RHSA-2016-1519.htmlREDHAT
91787http://www.securityfocus.com/bid/91787BID
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176765https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176765CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05143554https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05143554CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05096953https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05096953CONFIRM
HPSBMU03573http://marc.info/?l=bugtraq&m=146133665209436&w=2HP
HPSBMU03575http://marc.info/?l=bugtraq&m=146108058503441&w=2HP
HPSBGN03569http://marc.info/?l=bugtraq&m=145983526810210&w=2HP
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlhttp://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlCONFIRM
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlCONFIRM
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlCONFIRM
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlCONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05307589https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05307589CONFIRM
83733http://www.securityfocus.com/bid/83733BID
openSUSE-SU-2016:1239http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.htmlSUSE
openSUSE-SU-2016:1241http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.htmlSUSE
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-openssl-enhttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-openssl-enCONFIRM
https://www.openssl.org/news/secadv/20160301.txthttps://www.openssl.org/news/secadv/20160301.txtCONFIRM
SUSE-SU-2016:0621http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.htmlSUSE
SUSE-SU-2016:0631http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.htmlSUSE
VU#583776https://www.kb.cert.org/vuls/id/583776CERT-VN
GLSA-201603-15https://security.gentoo.org/glsa/201603-15GENTOO
openSUSE-SU-2016:0720http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.htmlSUSE
SUSE-SU-2016:0620http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.htmlSUSE
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10722http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10722CONFIRM
http://support.citrix.com/article/CTX208403http://support.citrix.com/article/CTX208403CONFIRM
openSUSE-SU-2016:0628http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.htmlSUSE
https://ics-cert.us-cert.gov/advisories/ICSA-16-103-03https://ics-cert.us-cert.gov/advisories/ICSA-16-103-03MISC
openSUSE-SU-2016:0638http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.htmlSUSE
openSUSE-SU-2016:0627http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.htmlSUSE
20160302 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-opensslCISCO
openSUSE-SU-2016:0637http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.htmlSUSE
SUSE-SU-2016:0617http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.htmlSUSE
SUSE-SU-2016:0678http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.htmlSUSE
SUSE-SU-2016:0624http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.htmlSUSE
openSUSE-SU-2016:0640http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlSUSE
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-623229.pdfhttp://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-623229.pdfCONFIRM
SUSE-SU-2016:1057http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.htmlSUSE
SUSE-SU-2016:0641http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.htmlSUSE
https://kc.mcafee.com/corporate/index?page=content&id=SB10154https://kc.mcafee.com/corporate/index?page=content&id=SB10154CONFIRM
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804CONFIRM
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_ushttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_usCONFIRM
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_ushttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_usCONFIRM
1035133http://www.securitytracker.com/id/1035133SECTRACK
https://security.netapp.com/advisory/ntap-20160301-0001/https://security.netapp.com/advisory/ntap-20160301-0001/CONFIRM
FreeBSD-SA-16:12https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.ascFREEBSD
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlCONFIRM
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixeshttps://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+FixesCONFIRM
https://cert-portal.siemens.com/productcert/pdf/ssa-623229.pdfhttps://cert-portal.siemens.com/productcert/pdf/ssa-623229.pdfCONFIRM
https://www.arista.com/en/support/advisories-notices/security-advisories/1260-security-advisory-18https://www.arista.com/en/support/advisories-notices/security-advisories/1260-security-advisory-18MISC
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfhttps://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfCONFIRM