ID

VAR-E-200303-0183


CVE

cve_id:CVE-2003-0131

Trust: 0.3

sources: BID: 7148

TITLE

OpenSSL Bad Version Oracle Side Channel Attack Vulnerability

Trust: 0.3

sources: BID: 7148

DESCRIPTION

A problem with OpenSSL may leak sensitive information. A user could abuse the response of vulnerable servers to act as an oracle. By sending a large number of adaptive attacks, the possibility exists for a remote user to create a choice of ciphertext encrypted with the private key of the server.

Trust: 0.3

sources: BID: 7148

AFFECTED PRODUCTS

vendor:sunmodel:cobalt raq xtrscope: - version: -

Trust: 0.3

vendor:sunmodel:cobalt raqscope:eqversion:550

Trust: 0.3

vendor:sunmodel:cobalt raqscope:eqversion:4

Trust: 0.3

vendor:sunmodel:cobalt qubescope:eqversion:3

Trust: 0.3

vendor:sgimodel:irixscope:eqversion:6.5.19

Trust: 0.3

vendor:scomodel:open serverscope:eqversion:5.0.7

Trust: 0.3

vendor:scomodel:open serverscope:eqversion:5.0.6

Trust: 0.3

vendor:scomodel:open serverscope:eqversion:5.0.5

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:8.1.7

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:8.1.7

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.2.0

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:8.1.7

Trust: 0.3

vendor:oraclemodel:oracle9i application serverscope:eqversion:9.0.3

Trust: 0.3

vendor:oraclemodel:oracle9i application serverscope:eqversion:9.0.2

Trust: 0.3

vendor:oraclemodel:oracle9i application serverscope:eqversion:1.0.2.2

Trust: 0.3

vendor:oraclemodel:oracle9i application server .1sscope:eqversion:1.0.2

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.2.0

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:8.1.7

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.6

Trust: 0.3

vendor:gnumodel:transport layer security libraryscope:eqversion:0.8.4

Trust: 0.3

vendor:gnumodel:transport layer security libraryscope:eqversion:0.8.3

Trust: 0.3

vendor:gnumodel:transport layer security libraryscope:eqversion:0.8.2

Trust: 0.3

vendor:gnumodel:transport layer security libraryscope:eqversion:0.8.1

Trust: 0.3

vendor:gnumodel:transport layer security libraryscope:eqversion:0.8.0

Trust: 0.3

vendor:f5model:big-ip blade controller ptf-01scope:eqversion:4.2.3

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.4

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.3

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.2

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.4

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.3

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.2

Trust: 0.3

vendor:computermodel:associates etrust security command centerscope:eqversion:1.0

Trust: 0.3

vendor:compaqmodel:tru64 bscope:eqversion:5.1

Trust: 0.3

vendor:compaqmodel:tru64 ascope:eqversion:5.1

Trust: 0.3

vendor:compaqmodel:tru64scope:eqversion:5.1

Trust: 0.3

vendor:compaqmodel:tru64 ascope:eqversion:5.0

Trust: 0.3

vendor:compaqmodel:tru64 gscope:eqversion:4.0

Trust: 0.3

vendor:compaqmodel:tru64 fscope:eqversion:4.0

Trust: 0.3

vendor:compaqmodel:openvms vaxscope:eqversion:7.3

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:7.3

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:7.2.1

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:7.2-2

Trust: 0.3

vendor:compaqmodel:openvms -1h2 alphascope:eqversion:7.2

Trust: 0.3

vendor:compaqmodel:openvms -1h1 alphascope:eqversion:7.2

Trust: 0.3

vendor:compaqmodel:openvms vaxscope:eqversion:7.2

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:7.2

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:7.1-2

Trust: 0.3

vendor:compaqmodel:openvms vaxscope:eqversion:7.1

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:7.1

Trust: 0.3

vendor:compaqmodel:openvms vaxscope:eqversion:6.2

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:6.2

Trust: 0.3

vendor:compaqmodel:openvmsscope:eqversion:6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:opensslmodel:project openssl bscope:neversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project openssl jscope:neversion:0.9.6

Trust: 0.3

vendor:hpmodel:hp-ux apache-based web serverscope:neversion:1.0.07.01

Trust: 0.3

vendor:hpmodel:hp-ux apache-based web serverscope:neversion:1.0.03.01

Trust: 0.3

vendor:hpmodel:apache-based web serverscope:neversion:1.3.27.02

Trust: 0.3

vendor:gnumodel:transport layer security libraryscope:neversion:0.8.5

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.2.5

Trust: 0.3

sources: BID: 7148

EXPLOIT

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

Trust: 0.3

sources: BID: 7148

PRICE

Free

Trust: 0.3

sources: BID: 7148

TYPE

Design Error

Trust: 0.3

sources: BID: 7148

CREDITS

Discovery credited to Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa.

Trust: 0.3

sources: BID: 7148

EXTERNAL IDS

db:NVDid:CVE-2003-0131

Trust: 0.3

db:BIDid:7148

Trust: 0.3

sources: BID: 7148

REFERENCES

url:http://otn.oracle.com/deploy/security/pdf/2003alert62.pdf

Trust: 0.3

url:http://www.info.apple.com/usen/security/security_updates.html

Trust: 0.3

url:http://metalink.oracle.com

Trust: 0.3

url:http://eprint.iacr.org/2003/052/

Trust: 0.3

sources: BID: 7148

SOURCES

db:BIDid:7148

LAST UPDATE DATE

2022-07-27T09:26:33.297000+00:00


SOURCES UPDATE DATE

db:BIDid:7148date:2009-07-11T21:06:00

SOURCES RELEASE DATE

db:BIDid:7148date:2003-03-19T00:00:00