The getclientmasterkey function in s2srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "0.9.8ze"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-beta3"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-beta4"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-beta5"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0a"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0b"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0c"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0d"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0e"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0f"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0g"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0h"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0i"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0j"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0k"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0l"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0m"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0n"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0o"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0p"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0q"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1-beta3"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1a"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1b"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1c"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1d"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1e"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1f"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1g"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1h"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1i"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1j"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1k"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1l"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2-beta3"
}
]
}