Description
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3500-1 | openssl security update |
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Openssl
Subscribe
Openssl
Subscribe
Pulsesecure
Subscribe
Client
Subscribe
Steel Belted Radius
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Web Server
Subscribe
Jboss Operations Network
Subscribe
Rhel Aus
Subscribe
Rhel Els
Subscribe
Rhel Eus
Subscribe
Rhel Mission Critical
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T22:30:05.111Z
Reserved: 2015-12-16T00:00:00.000Z
Link: CVE-2016-0800
No data.
Status : Deferred
Published: 2016-03-01T20:59:00.253
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-0800
OpenCVE Enrichment
No data.
Debian DSA