cpe:/a:openssl:openssl:0.9.8ze cpe:/a:openssl:openssl:1.0.0 cpe:/a:openssl:openssl:1.0.0:beta1 cpe:/a:openssl:openssl:1.0.0:beta2 cpe:/a:openssl:openssl:1.0.0:beta3 cpe:/a:openssl:openssl:1.0.0:beta4 cpe:/a:openssl:openssl:1.0.0:beta5 cpe:/a:openssl:openssl:1.0.0a cpe:/a:openssl:openssl:1.0.0b cpe:/a:openssl:openssl:1.0.0c cpe:/a:openssl:openssl:1.0.0d cpe:/a:openssl:openssl:1.0.0e cpe:/a:openssl:openssl:1.0.0f cpe:/a:openssl:openssl:1.0.0g cpe:/a:openssl:openssl:1.0.0h cpe:/a:openssl:openssl:1.0.0i cpe:/a:openssl:openssl:1.0.0j cpe:/a:openssl:openssl:1.0.0k cpe:/a:openssl:openssl:1.0.0l cpe:/a:openssl:openssl:1.0.0m cpe:/a:openssl:openssl:1.0.0n cpe:/a:openssl:openssl:1.0.0o cpe:/a:openssl:openssl:1.0.0p cpe:/a:openssl:openssl:1.0.0q cpe:/a:openssl:openssl:1.0.1 cpe:/a:openssl:openssl:1.0.1:beta1 cpe:/a:openssl:openssl:1.0.1:beta2 cpe:/a:openssl:openssl:1.0.1:beta3 cpe:/a:openssl:openssl:1.0.1a cpe:/a:openssl:openssl:1.0.1b cpe:/a:openssl:openssl:1.0.1c cpe:/a:openssl:openssl:1.0.1d cpe:/a:openssl:openssl:1.0.1e cpe:/a:openssl:openssl:1.0.1f cpe:/a:openssl:openssl:1.0.1g cpe:/a:openssl:openssl:1.0.1h cpe:/a:openssl:openssl:1.0.1i cpe:/a:openssl:openssl:1.0.1j cpe:/a:openssl:openssl:1.0.1k cpe:/a:openssl:openssl:1.0.1l cpe:/a:openssl:openssl:1.0.2 cpe:/a:openssl:openssl:1.0.2:beta1 cpe:/a:openssl:openssl:1.0.2:beta2 cpe:/a:openssl:openssl:1.0.2:beta3 CVE-2016-0704 2016-03-02T06:59:01.363-05:00 2018-01-18T13:18:03.213-05:00 4.3 NETWORK MEDIUM NONE PARTIAL NONE NONE http://nvd.nist.gov 2016-12-28T09:37:05.697-05:00 SECTRACK 1035133 CISCO 20160302 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016 BID 83764 FREEBSD FreeBSD-SA-16:12 GENTOO GLSA-201603-15 SUSE SUSE-SU-2016:0617 SUSE SUSE-SU-2016:0620 SUSE SUSE-SU-2016:0621 SUSE SUSE-SU-2016:0624 SUSE SUSE-SU-2016:0631 SUSE SUSE-SU-2016:0641 SUSE SUSE-SU-2016:0678 SUSE SUSE-SU-2016:1057 CONFIRM http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 CONFIRM http://openssl.org/news/secadv/20160301.txt CONFIRM http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html CONFIRM http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html CONFIRM http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html CONFIRM http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html MISC https://drownattack.com CONFIRM https://git.openssl.org/?p=openssl.git;a=commit;h=ae50d8270026edf5b3c7f8aaa0c6677462b33d97 CONFIRM https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us CONFIRM https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 CONFIRM https://www.openssl.org/news/secadv/20160301.txt SUSE openSUSE-SU-2016:0628 SUSE openSUSE-SU-2016:0637 SUSE openSUSE-SU-2016:0638 SUSE openSUSE-SU-2016:0720 An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.