Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.112912
Category:General
Title:OpenSSL: Timing-based attacks on SSL/TLS with CBC encryption (CVE-2003-0078) - Linux
Summary:OpenSSL is prone to timing-based attacks on SSL/TLS with CBC encryption.
Description:Summary:
OpenSSL is prone to timing-based attacks on SSL/TLS with CBC encryption.

Vulnerability Insight:
ssl3_get_record in s3_pkt.c for OpenSSL does not perform a MAC
computation if an incorrect block cipher padding is used, which causes an information leak
(timing discrepancy) that may make it easier to launch cryptographic attacks that rely on
distinguishing between padding and MAC verification errors, possibly leading to extraction of
the original plaintext, aka the 'Vaudenay timing attack'.

Vulnerability Impact:
An active attacker can substitute specifically made-up
ciphertext blocks for blocks sent by legitimate SSL/TLS parties and measure the time
until a response arrives: SSL/TLS includes data authentication to ensure that such
modified ciphertext blocks will be rejected by the peer (and the connection aborted),
but the attacker may be able to use timing observations to distinguish between two
different error cases, namely block cipher padding errors and MAC verification errors.
This is sufficient for an adaptive attack that finally can obtain the complete plaintext block.

Affected Software/OS:
OpenSSL version 0.9.6 through 0.9.6h and 0.9.7.

Solution:
Update to version 0.9.6.i, 0.9.7a or later. See the references for
more details.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0078
BugTraq ID: 6884
http://www.securityfocus.com/bid/6884
Bugtraq: 20030219 OpenSSL 0.9.7a and 0.9.6i released (Google Search)
http://marc.info/?l=bugtraq&m=104567627211904&w=2
Bugtraq: 20030219 [OpenPKG-SA-2003.013] OpenPKG Security Advisory (openssl) (Google Search)
http://marc.info/?l=bugtraq&m=104568426824439&w=2
Computer Incident Advisory Center Bulletin: N-051
http://www.ciac.org/ciac/bulletins/n-051.shtml
Conectiva Linux advisory: CLSA-2003:570
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000570
Debian Security Information: DSA-253 (Google Search)
http://www.debian.org/security/2003/dsa-253
En Garde Linux Advisory: ESA-20030220-005
http://www.linuxsecurity.com/advisories/engarde_advisory-2874.html
FreeBSD Security Advisory: FreeBSD-SA-03:02
http://marc.info/?l=bugtraq&m=104577183206905&w=2
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:020
NETBSD Security Advisory: NetBSD-SA2003-001
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-001.txt.asc
http://www.osvdb.org/3945
http://www.redhat.com/support/errata/RHSA-2003-062.html
http://www.redhat.com/support/errata/RHSA-2003-063.html
http://www.redhat.com/support/errata/RHSA-2003-082.html
http://www.redhat.com/support/errata/RHSA-2003-104.html
http://www.redhat.com/support/errata/RHSA-2003-205.html
SGI Security Advisory: 20030501-01-I
ftp://patches.sgi.com/support/free/security/advisories/20030501-01-I
SuSE Security Announcement: SuSE-SA:2003:011 (Google Search)
http://www.trustix.org/errata/2003/0005
http://www.iss.net/security_center/static/11369.php
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.