Versio.io

CVE-2016-0800

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 01-03-2016 09:59
Last modified: - 25-01-2022 06:15
Total changes: - 2

Description

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

Common Vulnerability Scoring System (CVSS)

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
High
Attack complexity
Network
Attack vector
None
Availability
High
Confidentiality
None
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
5.9
Base score
2.2
3.6
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=openssl AND product=openssl AND version=1.0.2d
vendor=openssl AND product=openssl AND version=1.0.2c
vendor=openssl AND product=openssl AND version=1.0.2b
vendor=openssl AND product=openssl AND version=1.0.1q
vendor=openssl AND product=openssl AND version=1.0.1p
vendor=openssl AND product=openssl AND version=1.0.1i
vendor=openssl AND product=openssl AND version=1.0.1h
vendor=openssl AND product=openssl AND version=1.0.1a
vendor=openssl AND product=openssl AND version=1.0.1 AND update=beta3
vendor=openssl AND product=openssl AND version=1.0.1 AND update=beta2
vendor=openssl AND product=openssl AND version=1.0.2a
vendor=openssl AND product=openssl AND version=1.0.2 AND update=beta3
vendor=openssl AND product=openssl AND version=1.0.1o
vendor=openssl AND product=openssl AND version=1.0.1n
vendor=openssl AND product=openssl AND version=1.0.1g
vendor=openssl AND product=openssl AND version=1.0.1f
vendor=openssl AND product=openssl AND version=1.0.1 AND update=beta1
vendor=openssl AND product=openssl AND version=1.0.1
vendor=openssl AND product=openssl AND version=1.0.2 AND update=beta2
vendor=openssl AND product=openssl AND version=1.0.2 AND update=beta1
vendor=openssl AND product=openssl AND version=1.0.1m
vendor=openssl AND product=openssl AND version=1.0.1l
vendor=openssl AND product=openssl AND version=1.0.1e
vendor=openssl AND product=openssl AND version=1.0.1d
vendor=openssl AND product=openssl AND version=1.0.2f
vendor=openssl AND product=openssl AND version=1.0.2e
vendor=openssl AND product=openssl AND version=1.0.2
vendor=openssl AND product=openssl AND version=1.0.1r
vendor=openssl AND product=openssl AND version=1.0.1k
vendor=openssl AND product=openssl AND version=1.0.1j
vendor=openssl AND product=openssl AND version=1.0.1c
vendor=openssl AND product=openssl AND version=1.0.1b
OR
vendor=pulsesecure AND product=client AND version=- AND target_software=iphone_os
vendor=pulsesecure AND product=steel_belted_radius AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2016-0800

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.