Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2003-0078


ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."


Published

2003-03-03T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-203

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application openssl openssl < 0.9.6i Yes
Application openssl openssl 0.9.6i Yes
Application openssl openssl 0.9.7 Yes
Application openssl openssl 0.9.7 Yes
Application openssl openssl 0.9.7 Yes
Application openssl openssl 0.9.7 Yes
Application openssl openssl 0.9.7 Yes
Application openssl openssl 0.9.7 Yes
Application openssl openssl 0.9.7 Yes
Operating System freebsd freebsd 4.2 Yes
Operating System freebsd freebsd 4.3 Yes
Operating System freebsd freebsd 4.4 Yes
Operating System freebsd freebsd 4.5 Yes
Operating System freebsd freebsd 4.6 Yes
Operating System freebsd freebsd 4.7 Yes
Operating System freebsd freebsd 5.0 Yes
Operating System openbsd openbsd 3.1 Yes
Operating System openbsd openbsd 3.2 Yes

References