First published: Fri Mar 21 2003(Updated: )
The SSL and TLS components for OpenSSL 0.9.6i and earlier, 0.9.7, and 0.9.7a allow remote attackers to perform an unauthorized RSA private key operation via a modified Bleichenbacher attack that uses a large number of SSL or TLS connections using PKCS #1 v1.5 padding that cause OpenSSL to leak information regarding the relationship between ciphertext and the associated plaintext, aka the "Klima-Pokorny-Rosa attack."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL | =0.9.6 | |
OpenSSL | =0.9.6a | |
OpenSSL | =0.9.6b | |
OpenSSL | =0.9.6c | |
OpenSSL | =0.9.6d | |
OpenSSL | =0.9.6e | |
OpenSSL | =0.9.6g | |
OpenSSL | =0.9.6h | |
OpenSSL | =0.9.6i | |
OpenSSL | =0.9.7 | |
OpenSSL | =0.9.7a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0131 is classified as a medium to high severity vulnerability due to the potential for unauthorized access to RSA private keys.
To fix CVE-2003-0131, upgrade OpenSSL to version 0.9.7b or later, which contains the necessary patches.
CVE-2003-0131 affects OpenSSL versions 0.9.6i and earlier, as well as 0.9.7 and 0.9.7a.
CVE-2003-0131 allows attackers to perform a Bleichenbacher attack that can compromise RSA private keys through TLS or SSL connections.
While CVE-2003-0131 is from 2003, its relevance persists for systems still using outdated OpenSSL versions with this vulnerability.