CVE-2003-0078

N/A Unknown
Published: March 03, 2003 Modified: April 16, 2026
View on NVD

Description

ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=104567627211904&w=2
Source: cve@mitre.org
Third Party Advisory
http://marc.info/?l=bugtraq&m=104568426824439&w=2
Source: cve@mitre.org
Third Party Advisory
http://marc.info/?l=bugtraq&m=104577183206905&w=2
Source: cve@mitre.org
Third Party Advisory
http://www.ciac.org/ciac/bulletins/n-051.shtml
Source: cve@mitre.org
Broken Link
http://www.debian.org/security/2003/dsa-253
Source: cve@mitre.org
Broken Link Vendor Advisory
http://www.iss.net/security_center/static/11369.php
Source: cve@mitre.org
Broken Link Vendor Advisory
http://www.openssl.org/news/secadv_20030219.txt
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
http://www.osvdb.org/3945
Source: cve@mitre.org
Broken Link
http://www.securityfocus.com/bid/6884
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.trustix.org/errata/2003/0005
Source: cve@mitre.org
Broken Link
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-001.txt.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
ftp://patches.sgi.com/support/free/security/advisories/20030501-01-I
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000570
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://marc.info/?l=bugtraq&m=104567627211904&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=104568426824439&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=104577183206905&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ciac.org/ciac/bulletins/n-051.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2003/dsa-253
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://www.iss.net/security_center/static/11369.php
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://www.linuxsecurity.com/advisories/engarde_advisory-2874.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:020
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.openssl.org/news/secadv_20030219.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory
http://www.osvdb.org/3945
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2003-062.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2003-063.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2003-082.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2003-104.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2003-205.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/6884
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.trustix.org/errata/2003/0005
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link

40 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
13.1%
94th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

openssl freebsd openbsd