Vulnerability Details : CVE-2003-0131
The SSL and TLS components for OpenSSL 0.9.6i and earlier, 0.9.7, and 0.9.7a allow remote attackers to perform an unauthorized RSA private key operation via a modified Bleichenbacher attack that uses a large number of SSL or TLS connections using PKCS #1 v1.5 padding that cause OpenSSL to leak information regarding the relationship between ciphertext and the associated plaintext, aka the "Klima-Pokorny-Rosa attack."
Products affected by CVE-2003-0131
- cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2003-0131
23.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0131
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
Vendor statements for CVE-2003-0131
-
Red Hat 2007-03-14Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References for CVE-2003-0131
-
http://marc.info/?l=bugtraq&m=104878215721135&w=2
'TSLSA-2003-0013 - openssl' - MARC
-
http://www.openpkg.org/security/OpenPKG-SA-2003.026-openssl.html
-
http://www.mandriva.com/security/advisories?name=MDKSA-2003:035
Mandriva
-
http://www.securityfocus.com/bid/7148
Patch;Vendor Advisory
-
http://lists.apple.com/mhonarc/security-announce/msg00028.html
404 Not Found
-
http://www.debian.org/security/2003/dsa-288
Debian -- The Universal Operating System
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000625
CONECTIVA | Análises dos Melhores Produtos Online (#10 Melhores)
-
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-007.txt.asc
-
https://lists.opensuse.org/opensuse-security-announce/2003-04/msg00005.html
SuSE Security Announcement: openssl (SuSE-SA:2003:024) - openSUSE Security Announce - openSUSE Mailing Lists
-
http://www.redhat.com/support/errata/RHSA-2003-102.html
Support
-
http://www.openssl.org/news/secadv_20030319.txt
404 Page not found | Library
-
http://marc.info/?l=bugtraq&m=104852637112330&w=2
'GLSA: openssl (200303-20)' - MARC
-
http://www.redhat.com/support/errata/RHSA-2003-101.html
Support
-
ftp://patches.sgi.com/support/free/security/advisories/20030501-01-I
-
ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-014.0.txt
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/11586
Multiple SSL/TLS implementation could leak premaster-secret value CVE-2003-0131 Vulnerability Report
-
http://www.gentoo.org/security/en/glsa/glsa-200303-20.xml
Gentoo Linux — Error 404 (Not Found)
-
http://eprint.iacr.org/2003/052/
Attacking RSA-based Sessions in SSL/TLSVendor Advisory
-
http://www.linuxsecurity.com/advisories/immunix_advisory-3066.html
Stay Vigilant with Timely Linux Security Advisories
-
http://www.kb.cert.org/vuls/id/888801
VU#888801 - SSL/TLS implementations disclose side channel information via PKCS #1 v1.5 version number extensionThird Party Advisory;US Government Resource
-
http://www.securityfocus.com/archive/1/316577/30/25310/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A461
404 Not Found
-
http://marc.info/?l=bugtraq&m=104811162730834&w=2
'[OpenSSL Advisory] Klima-Pokorny-Rosa attack on PKCS #1 v1.5 padding' - MARC
Jump to