Vulnerability Details : CVE-2003-0131
The SSL and TLS components for OpenSSL 0.9.6i and earlier, 0.9.7, and 0.9.7a allow remote attackers to perform an unauthorized RSA private key operation via a modified Bleichenbacher attack that uses a large number of SSL or TLS connections using PKCS #1 v1.5 padding that cause OpenSSL to leak information regarding the relationship between ciphertext and the associated plaintext, aka the "Klima-Pokorny-Rosa attack."
Exploit prediction scoring system (EPSS) score for CVE-2003-0131
Probability of exploitation activity in the next 30 days: 7.42%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2003-0131
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
Vendor statements for CVE-2003-0131
-
Red Hat 2007-03-14Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
-
http://marc.info/?l=bugtraq&m=104878215721135&w=2
-
http://www.openpkg.org/security/OpenPKG-SA-2003.026-openssl.html
-
http://www.mandriva.com/security/advisories?name=MDKSA-2003:035
-
http://www.securityfocus.com/bid/7148
Patch;Vendor Advisory
- http://lists.apple.com/mhonarc/security-announce/msg00028.html
- http://www.debian.org/security/2003/dsa-288
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000625
-
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-007.txt.asc
-
https://lists.opensuse.org/opensuse-security-announce/2003-04/msg00005.html
- http://www.redhat.com/support/errata/RHSA-2003-102.html
-
http://www.openssl.org/news/secadv_20030319.txt
-
http://marc.info/?l=bugtraq&m=104852637112330&w=2
- http://www.redhat.com/support/errata/RHSA-2003-101.html
- ftp://patches.sgi.com/support/free/security/advisories/20030501-01-I
- ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-014.0.txt
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/11586
-
http://www.gentoo.org/security/en/glsa/glsa-200303-20.xml
-
http://eprint.iacr.org/2003/052/
Vendor Advisory
-
http://www.linuxsecurity.com/advisories/immunix_advisory-3066.html
-
http://www.kb.cert.org/vuls/id/888801
Third Party Advisory;US Government Resource
- http://www.securityfocus.com/archive/1/316577/30/25310/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A461
-
http://marc.info/?l=bugtraq&m=104811162730834&w=2
- cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*