CVE-2012-0884

The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077086.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077221.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077666.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html
http://marc.info/?l=bugtraq&m=133728068926468&w=2
http://marc.info/?l=bugtraq&m=133728068926468&w=2
http://marc.info/?l=bugtraq&m=133951357207000&w=2
http://marc.info/?l=bugtraq&m=133951357207000&w=2
http://marc.info/?l=bugtraq&m=134039053214295&w=2
http://marc.info/?l=bugtraq&m=134039053214295&w=2
http://rhn.redhat.com/errata/RHSA-2012-0426.html
http://rhn.redhat.com/errata/RHSA-2012-0488.html
http://rhn.redhat.com/errata/RHSA-2012-0531.html
http://rhn.redhat.com/errata/RHSA-2012-1306.html
http://rhn.redhat.com/errata/RHSA-2012-1307.html
http://rhn.redhat.com/errata/RHSA-2012-1308.html
http://secunia.com/advisories/48580
http://secunia.com/advisories/48895
http://secunia.com/advisories/48916
http://secunia.com/advisories/57353
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
http://www.debian.org/security/2012/dsa-2454
http://www.kb.cert.org/vuls/id/737740 US Government Resource
http://www.openssl.org/news/secadv_20120312.txt Vendor Advisory
https://downloads.avaya.com/css/P8/documents/100162507
https://hermes.opensuse.org/messages/14330767
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077086.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077221.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077666.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html
http://marc.info/?l=bugtraq&m=133728068926468&w=2
http://marc.info/?l=bugtraq&m=133728068926468&w=2
http://marc.info/?l=bugtraq&m=133951357207000&w=2
http://marc.info/?l=bugtraq&m=133951357207000&w=2
http://marc.info/?l=bugtraq&m=134039053214295&w=2
http://marc.info/?l=bugtraq&m=134039053214295&w=2
http://rhn.redhat.com/errata/RHSA-2012-0426.html
http://rhn.redhat.com/errata/RHSA-2012-0488.html
http://rhn.redhat.com/errata/RHSA-2012-0531.html
http://rhn.redhat.com/errata/RHSA-2012-1306.html
http://rhn.redhat.com/errata/RHSA-2012-1307.html
http://rhn.redhat.com/errata/RHSA-2012-1308.html
http://secunia.com/advisories/48580
http://secunia.com/advisories/48895
http://secunia.com/advisories/48916
http://secunia.com/advisories/57353
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
http://www.debian.org/security/2012/dsa-2454
http://www.kb.cert.org/vuls/id/737740 US Government Resource
http://www.openssl.org/news/secadv_20120312.txt Vendor Advisory
https://downloads.avaya.com/css/P8/documents/100162507
https://hermes.opensuse.org/messages/14330767
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.0b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.1b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*

History

21 Nov 2024, 01:35

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077086.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077086.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077221.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077221.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077666.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077666.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html -
References () http://marc.info/?l=bugtraq&m=133728068926468&w=2 - () http://marc.info/?l=bugtraq&m=133728068926468&w=2 -
References () http://marc.info/?l=bugtraq&m=133951357207000&w=2 - () http://marc.info/?l=bugtraq&m=133951357207000&w=2 -
References () http://marc.info/?l=bugtraq&m=134039053214295&w=2 - () http://marc.info/?l=bugtraq&m=134039053214295&w=2 -
References () http://rhn.redhat.com/errata/RHSA-2012-0426.html - () http://rhn.redhat.com/errata/RHSA-2012-0426.html -
References () http://rhn.redhat.com/errata/RHSA-2012-0488.html - () http://rhn.redhat.com/errata/RHSA-2012-0488.html -
References () http://rhn.redhat.com/errata/RHSA-2012-0531.html - () http://rhn.redhat.com/errata/RHSA-2012-0531.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1306.html - () http://rhn.redhat.com/errata/RHSA-2012-1306.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1307.html - () http://rhn.redhat.com/errata/RHSA-2012-1307.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1308.html - () http://rhn.redhat.com/errata/RHSA-2012-1308.html -
References () http://secunia.com/advisories/48580 - () http://secunia.com/advisories/48580 -
References () http://secunia.com/advisories/48895 - () http://secunia.com/advisories/48895 -
References () http://secunia.com/advisories/48916 - () http://secunia.com/advisories/48916 -
References () http://secunia.com/advisories/57353 - () http://secunia.com/advisories/57353 -
References () http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 - () http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 -
References () http://www.debian.org/security/2012/dsa-2454 - () http://www.debian.org/security/2012/dsa-2454 -
References () http://www.kb.cert.org/vuls/id/737740 - US Government Resource () http://www.kb.cert.org/vuls/id/737740 - US Government Resource
References () http://www.openssl.org/news/secadv_20120312.txt - Vendor Advisory () http://www.openssl.org/news/secadv_20120312.txt - Vendor Advisory
References () https://downloads.avaya.com/css/P8/documents/100162507 - () https://downloads.avaya.com/css/P8/documents/100162507 -
References () https://hermes.opensuse.org/messages/14330767 - () https://hermes.opensuse.org/messages/14330767 -

Information

Published : 2012-03-13 03:12

Updated : 2024-11-21 01:35


NVD link : CVE-2012-0884

Mitre link : CVE-2012-0884

CVE.ORG link : CVE-2012-0884


JSON object : View

Products Affected

openssl

  • openssl
CWE
CWE-310

Cryptographic Issues