ALAS-2014-429 ---- nss
|ID: oval:org.secpod.oval:def:1600038||Date: (C)2016-01-19 (M)2018-02-19|
|Class: PATCH||Family: unix|
A flaw was found in the way SSL 3.0 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining mode. This flaw allows a man-in-the-middle attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections.
|Amazon Linux AMI|