Upstream information

CVE-2003-0078 at MITRE

Description

ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:P/I:N/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
No SUSE Bugzilla entries cross referenced.

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SuSE Firewall on CD 2
SuSE Firewall on CD 2 - VPN
SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Office Server
  • openssl >= 0.9.6a-78
Builds
SuSE Linux Enterprise Server 8 for IPF
UnitedLinux 1.0
  • openssl >= 0.9.6g-43
Builds
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
  • openssl >= 0.9.6g-38
Builds
SuSE Linux Enterprise Server 8 for IBM zSeries
  • openssl >= 0.9.6g-24
Builds
SuSE Linux Openexchange Server 4
UnitedLinux 1.0
  • openssl >= 0.9.6g-55
Builds
SuSE Linux Enterprise Server 8 for IPF
UnitedLinux 1.0
  • openssl-devel >= 0.9.6g-43
Builds
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
  • openssl-devel >= 0.9.6g-38
Builds
SuSE Linux Enterprise Server 8 for IBM zSeries
  • openssl-devel >= 0.9.6g-24
Builds
SuSE Linux Openexchange Server 4
UnitedLinux 1.0
  • openssl-devel >= 0.9.6g-55
Builds