CVE-2016-7798

HIGH

Ruby-lang Openssl < 2.0.0 - Weak Encryption

Title source: rule
STIX 2.1

Description

The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.

References (8)

Core 8
Core References
Mailing List, Patch, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/09/30/6
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2017/dsa-3966
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/10/01/2
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/09/19/9
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/93031
Exploit, Third Party Advisory x_refsource_confirm
https://github.com/ruby/openssl/issues/49

Scores

CVSS v3 7.5
EPSS 0.0056
EPSS Percentile 68.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-326
Status published
Products (4)
debian/debian_linux 8.0
debian/debian_linux 9.0
ruby-lang/openssl < 2.0.0
rubygems/openssl 0 - 2.0.0RubyGems
Published Jan 30, 2017
Tracked Since Feb 18, 2026