CVE-2016-0800

MEDIUM

OpenSSL <1.0.1s, 1.0.2 before 1.0.2g - RCE

Title source: llm
STIX 2.1

Description

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

Exploits (1)

nomisec SCANNER 5 stars
by anthophilee · poc
https://github.com/anthophilee/A2SV--SSL-VUL-Scan

References (63)

Core 63
Core References
Vendor Advisory vendor-advisory
http://rhn.redhat.com/errata/RHSA-2016-1519.html
Third Party Advisory, VDB Entry vdb-entry
http://www.securityfocus.com/bid/91787
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/201603-15
Third Party Advisory, VDB Entry vdb-entry
http://www.securityfocus.com/bid/83733
Third Party Advisory, VDB Entry vdb-entry
http://www.securitytracker.com/id/1035133
Various Sources
https://drownattack.com
Third Party Advisory, US Government Resource third-party-advisory
https://www.kb.cert.org/vuls/id/583776

Scores

CVSS v3 5.9
EPSS 0.9043
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-310 CWE-200
Status published
Products (28)
openssl/openssl 1.0.1 (4 CPE variants)
openssl/openssl 1.0.1a
openssl/openssl 1.0.1b
openssl/openssl 1.0.1c
openssl/openssl 1.0.1d
openssl/openssl 1.0.1e
openssl/openssl 1.0.1f
openssl/openssl 1.0.1g
openssl/openssl 1.0.1h
openssl/openssl 1.0.1i
... and 18 more
Published Mar 01, 2016
Tracked Since Feb 18, 2026