The SSL 3.0 implementation in OpenSSL prior to 0.9.8s and 1.x prior to 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote malicious users to obtain sensitive information by decrypting the padding data sent by an SSL peer.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openssl openssl |
||
openssl openssl 0.9.8q |
||
openssl openssl 0.9.8j |
||
openssl openssl 0.9.8i |
||
openssl openssl 0.9.8b |
||
openssl openssl 0.9.8a |
||
openssl openssl 0.9.7g |
||
openssl openssl 0.9.7f |
||
openssl openssl 0.9.6m |
||
openssl openssl 0.9.6l |
||
openssl openssl 0.9.6f |
||
openssl openssl 0.9.6e |
||
openssl openssl 0.9.4 |
||
openssl openssl 0.9.2b |
||
openssl openssl 0.9.8p |
||
openssl openssl 0.9.8o |
||
openssl openssl 0.9.8h |
||
openssl openssl 0.9.8g |
||
openssl openssl 0.9.8 |
||
openssl openssl 0.9.7m |
||
openssl openssl 0.9.7e |
||
openssl openssl 0.9.7d |
||
openssl openssl 0.9.6k |
||
openssl openssl 0.9.6j |
||
openssl openssl 0.9.6d |
||
openssl openssl 0.9.6c |
||
openssl openssl 0.9.1c |
||
openssl openssl 0.9.8n |
||
openssl openssl 0.9.8m |
||
openssl openssl 0.9.8f |
||
openssl openssl 0.9.8e |
||
openssl openssl 0.9.7l |
||
openssl openssl 0.9.7k |
||
openssl openssl 0.9.7c |
||
openssl openssl 0.9.7b |
||
openssl openssl 0.9.6i |
||
openssl openssl 0.9.6h |
||
openssl openssl 0.9.6b |
||
openssl openssl 0.9.6a |
||
openssl openssl 0.9.8l |
||
openssl openssl 0.9.8k |
||
openssl openssl 0.9.8d |
||
openssl openssl 0.9.8c |
||
openssl openssl 0.9.7j |
||
openssl openssl 0.9.7i |
||
openssl openssl 0.9.7h |
||
openssl openssl 0.9.7a |
||
openssl openssl 0.9.7 |
||
openssl openssl 0.9.6g |
||
openssl openssl 0.9.6 |
||
openssl openssl 0.9.5a |
||
openssl openssl 0.9.5 |
||
openssl openssl 1.0.0a |
||
openssl openssl 1.0.0 |
||
openssl openssl 1.0.0d |
||
openssl openssl 1.0.0c |
||
openssl openssl 1.0.0b |