In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  Debian DSA | 
                DSA-3796-1 | apache2 security update | 
  Ubuntu USN | 
                USN-3279-1 | Apache HTTP Server vulnerabilities | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T17:52:49.825Z
Reserved: 2015-12-16T00:00:00
Link: CVE-2016-0736
No data.
Status : Deferred
Published: 2017-07-27T21:29:00.177
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-0736
                        OpenCVE Enrichment
                    No data.
 Debian DSA
 Ubuntu USN