First published: Mon Mar 03 2003(Updated: )
ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL | <0.9.6i | |
OpenSSL | =0.9.6i | |
OpenSSL | =0.9.7 | |
OpenSSL | =0.9.7-beta1 | |
OpenSSL | =0.9.7-beta2 | |
OpenSSL | =0.9.7-beta3 | |
OpenSSL | =0.9.7-beta4 | |
OpenSSL | =0.9.7-beta5 | |
OpenSSL | =0.9.7-beta6 | |
FreeBSD Kernel | =4.2 | |
FreeBSD Kernel | =4.3 | |
FreeBSD Kernel | =4.4 | |
FreeBSD Kernel | =4.5 | |
FreeBSD Kernel | =4.6 | |
FreeBSD Kernel | =4.7 | |
FreeBSD Kernel | =5.0 | |
OpenBSD | =3.1 | |
OpenBSD | =3.2 | |
OpenSSL | =0.9.3 | |
OpenSSL | =0.9.6d | |
OpenSSL | =0.9.1c | |
OpenSSL | =0.9.6 | |
OpenSSL | =0.9.6a | |
OpenSSL | =0.9.4 | |
OpenSSL | =0.9.5a | |
OpenSSL | =0.9.2b | |
OpenSSL | =0.9.6b | |
OpenSSL | =0.9.6c | |
OpenSSL | =0.9.6e | |
OpenSSL | =0.9.7 | |
OpenSSL | =0.9.5 | |
OpenSSL | =0.9.6g | |
OpenSSL | =0.9.6h | |
FreeBSD Kernel | =4.8-pre-release |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2003-0078 is categorized as a moderate severity issue primarily due to the risk of cryptographic attacks.
To fix CVE-2003-0078, you should upgrade OpenSSL to version 0.9.7a or later to ensure proper MAC computation.
CVE-2003-0078 affects OpenSSL versions before 0.9.7a and prior to 0.9.6i.
CVE-2003-0078 may facilitate cryptographic attacks that rely on timing discrepancies caused by incorrect block cipher padding.
While CVE-2003-0078 is an older vulnerability, it remains a concern for any systems still running affected versions of OpenSSL.