CVE-2016-0800
01.03.2016, 20:59
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.Enginsight
| Vendor | Product | Version |
|---|---|---|
| openssl | openssl | 1.0.1 |
| openssl | openssl | 1.0.1:beta1 |
| openssl | openssl | 1.0.1:beta2 |
| openssl | openssl | 1.0.1:beta3 |
| openssl | openssl | 1.0.1a:a |
| openssl | openssl | 1.0.1b:b |
| openssl | openssl | 1.0.1c:c |
| openssl | openssl | 1.0.1d:d |
| openssl | openssl | 1.0.1e:e |
| openssl | openssl | 1.0.1f:f |
| openssl | openssl | 1.0.1g:g |
| openssl | openssl | 1.0.1h:h |
| openssl | openssl | 1.0.1i:i |
| openssl | openssl | 1.0.1j:j |
| openssl | openssl | 1.0.1k:k |
| openssl | openssl | 1.0.1l:l |
| openssl | openssl | 1.0.1m:m |
| openssl | openssl | 1.0.1n:n |
| openssl | openssl | 1.0.1o:o |
| openssl | openssl | 1.0.1p:p |
| openssl | openssl | 1.0.1q:q |
| openssl | openssl | 1.0.1r:r |
| openssl | openssl | 1.0.2 |
| openssl | openssl | 1.0.2:beta1 |
| openssl | openssl | 1.0.2:beta2 |
| openssl | openssl | 1.0.2:beta3 |
| openssl | openssl | 1.0.2a:a |
| openssl | openssl | 1.0.2b:b |
| openssl | openssl | 1.0.2c:c |
| openssl | openssl | 1.0.2d:d |
| openssl | openssl | 1.0.2e:e |
| openssl | openssl | 1.0.2f:f |
| pulsesecure | steel_belted_radius | - |
𝑥
= Vulnerable software versions
Debian Releases
Debian Product | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| nss |
| ||||||||||||
| openssl |
|
Ubuntu Releases
Common Weakness Enumeration
References