NVD
- Id
- 17161
- Name
- CVE-2016-0800
- Description
- The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
- Reject
- CVSS Version
- 2
- CVSS Score
- 4.3
- Severity
- Medium
- CVSS Base Score
- 4.3
- CVSS Impact Subscore
- 2.9
- CVSS Exploit Subscore
- 8.6
- CVSS Vector
- (AV:N/AC:M/Au:N/C:P/I:N/A:N)
- Pub Date
- 2017-01-19
- Published
- 2016-03-01
- Modified Date
- 2016-12-27
- Seq
- 2016-0800
Related NVD References
Related JVN
Id | Name | Title | Summary | Cveinfo Name | Cveinfo Id | Nvdinfo Name | Nvdinfo Id | Cvssv2 | Cvssv3 | Jvnurl | Published Date | Last Updated Date | Actions |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
781 | JVNDB-2016-001554 | SSLv2 の暗号通信を解読可能な脆弱性 (DROWN 攻撃) | SSLv2 は、十分な回数のハンドシェイクの情報を収集できる場合、暗号通信を解読される可能性があります。これは "DROWN 攻撃" という名称で報じられています。 | CVE-2016-0800 | 87004 | CVE-2016-0800 | 17161 | 4.3 | 5.9 | http://jvndb.jvn.jp/ja/contents/2016/JVNDB-2016-001554.html | 2016-03-01 | 2016-11-14 | View |