The SSL provider component in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle encrypted packets, which allows man-in-the-middle attackers to conduct SSLv2 downgrade attacks against (1) SSLv3 sessions or (2) TLS sessions by intercepting handshakes and injecting content, aka "Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerability."
2013-01-09T18:09:40.540
2025-04-11T00:51:21.963
Deferred
CVSSv2: 5.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:N
8.6
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_7 | * | Yes |
Operating System | microsoft | windows_7 | * | Yes |
Operating System | microsoft | windows_7 | * | Yes |
Operating System | microsoft | windows_7 | * | Yes |
Operating System | microsoft | windows_8 | - | Yes |
Operating System | microsoft | windows_8 | - | Yes |
Operating System | microsoft | windows_rt | - | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2012 | - | Yes |
Operating System | microsoft | windows_vista | * | Yes |