CVE-2016-0703

The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

Published at
2016-03-02T11:59Z
3001 days ago
Modified
2022-12-13T12:15Z
524 days ago
CWE-200
Problem type

Impact

CVSS v3 vector string
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Attack Vector

Attack Complexity

Privileges Required

User Interaction

Scope

Confidentiality

Integrity

Availability

Severity Score Vector

5.9CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

References


URLType
drownattack.com
https://drownattack.com
MISC
git.openssl.org
https://git.openssl.org/?p=openssl.git;a=commit;h=ae50d8270026edf5b3c7f8aaa0c6677462b33d97
CONFIRM
openssl.org
http://openssl.org/news/secadv/20160301.txt
CONFIRM
kb.pulsesecure.net
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
CONFIRM
83743
http://www.securityfocus.com/bid/83743
BID
SUSE-SU-2016:0624
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
SUSE
openSUSE-SU-2016:0720
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
SUSE
www.openssl.org
https://www.openssl.org/news/secadv/20160301.txt
CONFIRM
SUSE-SU-2016:0620
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
SUSE
SUSE-SU-2016:0621
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
SUSE
openSUSE-SU-2016:0638
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
SUSE
openSUSE-SU-2016:0628
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
SUSE
SUSE-SU-2016:0631
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
SUSE
20160302 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
CISCO
SUSE-SU-2016:1057
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
SUSE
openSUSE-SU-2016:0637
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
SUSE
SUSE-SU-2016:0641
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
SUSE
SUSE-SU-2016:0617
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
SUSE
SUSE-SU-2016:0678
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
SUSE
GLSA-201603-15
https://security.gentoo.org/glsa/201603-15
GENTOO
kb.juniper.net
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
CONFIRM
h20566.www2.hpe.com
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
CONFIRM
1035133
http://www.securitytracker.com/id/1035133
SECTRACK
FreeBSD-SA-16:12
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
FREEBSD
www.oracle.com
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
CONFIRM
www.arista.com
https://www.arista.com/en/support/advisories-notices/security-advisories/1260-security-advisory-18
MISC
cert-portal.siemens.com
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
CONFIRM

GET https://vulnerabilitydata.com/api/details/CVE-2016-0703

{
	"id": "CVE-2016-0703",
	"published_date": "2016-03-02T11:59Z",
	"last_modified_date": "2022-12-13T12:15Z",
	"assigner": "secalert@redhat.com",
	"description": "The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.",
	"references": [
		{
			"url": "https://drownattack.com",
			"name": "https://drownattack.com",
			"refsource": "MISC",
			"tags": []
		},
		{
			"url": "https://git.openssl.org/?p=openssl.git;a=commit;h=ae50d8270026edf5b3c7f8aaa0c6677462b33d97",
			"name": "https://git.openssl.org/?p=openssl.git;a=commit;h=ae50d8270026edf5b3c7f8aaa0c6677462b33d97",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://openssl.org/news/secadv/20160301.txt",
			"name": "http://openssl.org/news/secadv/20160301.txt",
			"refsource": "CONFIRM",
			"tags": [
				"Vendor Advisory"
			]
		},
		{
			"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168",
			"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441",
			"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
			"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
			"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
			"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www.securityfocus.com/bid/83743",
			"name": "83743",
			"refsource": "BID",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html",
			"name": "SUSE-SU-2016:0624",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html",
			"name": "openSUSE-SU-2016:0720",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "https://www.openssl.org/news/secadv/20160301.txt",
			"name": "https://www.openssl.org/news/secadv/20160301.txt",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html",
			"name": "SUSE-SU-2016:0620",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html",
			"name": "SUSE-SU-2016:0621",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html",
			"name": "openSUSE-SU-2016:0638",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html",
			"name": "openSUSE-SU-2016:0628",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html",
			"name": "SUSE-SU-2016:0631",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl",
			"name": "20160302 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016",
			"refsource": "CISCO",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html",
			"name": "SUSE-SU-2016:1057",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html",
			"name": "openSUSE-SU-2016:0637",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html",
			"name": "SUSE-SU-2016:0641",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html",
			"name": "SUSE-SU-2016:0617",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html",
			"name": "SUSE-SU-2016:0678",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "https://security.gentoo.org/glsa/201603-15",
			"name": "GLSA-201603-15",
			"refsource": "GENTOO",
			"tags": []
		},
		{
			"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
			"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us",
			"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www.securitytracker.com/id/1035133",
			"name": "1035133",
			"refsource": "SECTRACK",
			"tags": []
		},
		{
			"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc",
			"name": "FreeBSD-SA-16:12",
			"refsource": "FREEBSD",
			"tags": []
		},
		{
			"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
			"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1260-security-advisory-18",
			"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1260-security-advisory-18",
			"refsource": "MISC",
			"tags": []
		},
		{
			"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
			"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
			"refsource": "CONFIRM",
			"tags": []
		}
	],
	"impact": {
		"baseMetricV3": {
			"cvssV3": {
				"version": "3.0",
				"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
				"attackVector": "NETWORK",
				"attackComplexity": "HIGH",
				"privilegesRequired": "NONE",
				"userInteraction": "NONE",
				"scope": "UNCHANGED",
				"confidentialityImpact": "HIGH",
				"integrityImpact": "NONE",
				"availabilityImpact": "NONE",
				"baseScore": 5.9,
				"baseSeverity": "MEDIUM"
			},
			"exploitabilityScore": 2.2,
			"impactScore": 3.6
		},
		"baseMetricV2": {
			"cvssV2": {
				"version": "2.0",
				"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
				"accessVector": "NETWORK",
				"accessComplexity": "MEDIUM",
				"authentication": "NONE",
				"confidentialityImpact": "PARTIAL",
				"integrityImpact": "NONE",
				"availabilityImpact": "NONE",
				"baseScore": 4.3
			},
			"severity": "MEDIUM",
			"exploitabilityScore": 8.6,
			"impactScore": 2.9,
			"obtainAllPrivilege": false,
			"obtainUserPrivilege": false,
			"obtainOtherPrivilege": false,
			"userInteractionRequired": false
		}
	},
	"problem_type": "CWE-200"
}