CVE-2003-0131
Published Mar 24, 2003
Last updated 6 years ago
Overview
- Description
- The SSL and TLS components for OpenSSL 0.9.6i and earlier, 0.9.7, and 0.9.7a allow remote attackers to perform an unauthorized RSA private key operation via a modified Bleichenbacher attack that uses a large number of SSL or TLS connections using PKCS #1 v1.5 padding that cause OpenSSL to leak information regarding the relationship between ciphertext and the associated plaintext, aka the "Klima-Pokorny-Rosa attack."
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Vendor comments
- Red HatRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5E4742C-A983-4F00-B24F-AB280C0E876D" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A0628DF-3A4C-4078-B615-22260671EABF" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "962FCB86-15AD-4399-8B7D-EC1DEA919C59" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "180D07AE-C571-4DD6-837C-43E2A946007A" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90789533-C741-4B1C-A24B-2C77B9E4DE5F" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1520065B-46D7-48A4-B9D0-5B49F690C5B4" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45A518E8-21BE-4C5C-B425-410AB1208E9C" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78E79A05-64F3-4397-952C-A5BB950C967D" } ], "operator": "OR" } ] } ]