5
CVSSv2

CVE-2003-0078

Published: 03/03/2003 Updated: 14/02/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

ssl3_get_record in s3_pkt.c for OpenSSL prior to 0.9.7a and 0.9.6 prior to 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.7

openssl openssl 0.9.6i

openssl openssl

openbsd openbsd 3.1

freebsd freebsd 4.5

freebsd freebsd 4.7

freebsd freebsd 4.4

openbsd openbsd 3.2

freebsd freebsd 4.2

freebsd freebsd 4.6

freebsd freebsd 4.3

freebsd freebsd 5.0

Vendor Advisories

A vulnerability has been discovered in OpenSSL, a Secure Socket Layer (SSL) implementation In an upcoming paper, Brice Canvel (EPFL), Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL, Ilion) describe and demonstrate a timing-based attack on CBC cipher suites used in SSL and TLS OpenSSL has been found to be vulnerable to this ...

Exploits

source: wwwsecurityfocuscom/bid/6884/info A side-channel attack against implementations of SSL exists that, through analysis of the timing of certain operations, can reveal sensitive information to an active adversary This information leaked by vulnerable implementations is reportedly sufficient for an adaptive attack that will ultimatel ...