CVE-2016-0736
27.07.2017, 21:29
In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.Enginsight
Vendor | Product | Version |
---|---|---|
apache | http_server | 2.4.0 |
apache | http_server | 2.4.1 |
apache | http_server | 2.4.2 |
apache | http_server | 2.4.3 |
apache | http_server | 2.4.6 |
apache | http_server | 2.4.7 |
apache | http_server | 2.4.8 |
apache | http_server | 2.4.9 |
apache | http_server | 2.4.10 |
apache | http_server | 2.4.12 |
apache | http_server | 2.4.14 |
apache | http_server | 2.4.16 |
apache | http_server | 2.4.19 |
apache | http_server | 2.4.20 |
apache | http_server | 2.4.21 |
apache | http_server | 2.4.22 |
apache | http_server | 2.4.23 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References