CVE-2016-0800

MEDIUM

OpenSSL <1.0.1s, 1.0.2 before 1.0.2g - RCE

Title source: llm

Description

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

Exploits (1)

nomisec SCANNER 5 stars
by anthophilee · poc
https://github.com/anthophilee/A2SV--SSL-VUL-Scan

References (63)

... and 43 more

Scores

CVSS v3 5.9
EPSS 0.9003
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Classification

CWE
CWE-310 CWE-200
Status draft

Affected Products (34)

openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
... and 19 more

Timeline

Published Mar 01, 2016
Tracked Since Feb 18, 2026