Description
ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."
Published: 2004-09-01
Score: 5.0 Medium
EPSS: 13.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.07401}

epss

{'score': 0.11643}


Subscriptions

Freebsd Freebsd
Openbsd Openbsd
Openssl Openssl
Redhat Enterprise Linux Linux Stronghold
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T01:43:35.347Z

Reserved: 2003-02-10T00:00:00.000Z

Link: CVE-2003-0078

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2003-03-03T05:00:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2003-0078

cve-icon Redhat

Severity : Moderate

Publid Date: 2003-02-19T00:00:00Z

Links: CVE-2003-0078 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses