CVE-2016-0800


Severity : MEDIUM
Published : 2016-03-01
Modified : 2018-01-18
Base Score : 4.3
Details : The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
Product/Version : Pro 4.x  
CGE 4.x  
Mobilinux 4.x  
Pro 5.0  
Pro 5.0  
CGE 5.x  
Mobilinux 5.x  
CGE 5.x  
Mobilinux 5.x  
Carrier Grade CGE 7.0  
Carrier Grade CGE 7.0  
 
 
 

CVE Vulnerabilities List CVE-2016

CVE-2016-0704 CVE-2016-0772 CVE-2016-0797 CVE-2016-0799
CVE-2016-0800 CVE-2016-1839 CVE-2016-2073 CVE-2016-2105
CVE-2016-2106 CVE-2016-2108 CVE-2016-2182 CVE-2016-2183
CVE-2016-3115 CVE-2016-3841 CVE-2016-3951 CVE-2016-4483
CVE-2016-5387 CVE-2016-6210 CVE-2016-6304 CVE-2016-6515
CVE-2016-9310 CVE-2016-9311