CVE编号
CVE-2016-0800利用情况
暂无补丁情况
官方补丁披露时间
2016-03-02漏洞描述
OpenSSL是一个实现安全套接层和安全传输层协议的通用开源加密库,可支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。OpenSSL 1.0.2及更早版本、1.0.1及更早版本存在跨协议攻击漏洞,当服务器使用了SSLv2协议和EXPORT加密套件,攻击者可利用漏洞对服务器的TLS会话信息进行破解;当客户端与不存在漏洞的服务器进行通信时,攻击者可以利用其他使用了SSLv2协议和EXPORT加密套件(即使服务器使用了不同的协议,例如SMTP,IMAP或者POP等协议)的服务器RSA密钥来对上述两者的通信数据进行破解。此漏洞被称为DROWN。
解决建议
厂商已发布安全公告修复该漏洞,请关注厂商主页下载更新:https://www.openssl.org/
参考链接 |
|
---|---|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10722 | |
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html | |
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html | |
http://marc.info/?l=bugtraq&m=145983526810210&w=2 | |
http://marc.info/?l=bugtraq&m=146108058503441&w=2 | |
http://marc.info/?l=bugtraq&m=146133665209436&w=2 | |
http://rhn.redhat.com/errata/RHSA-2016-1519.html | |
http://support.citrix.com/article/CTX208403 | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa... | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-openssl-en | |
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html | |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html | |
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | |
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html | |
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | |
http://www.securityfocus.com/bid/83733 | |
http://www.securityfocus.com/bid/91787 | |
http://www.securitytracker.com/id/1035133 | |
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-623229.pdf | |
https://access.redhat.com/security/vulnerabilities/drown | |
https://cert-portal.siemens.com/productcert/pdf/ssa-623229.pdf | |
https://drownattack.com | |
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr... | |
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr... | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n... | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n... | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n... | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n... | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n... | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n... | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n... | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n... | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n... | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n... | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n... | |
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Cente... | |
https://ics-cert.us-cert.gov/advisories/ICSA-16-103-03 | |
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168 | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10154 | |
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc | |
https://security.gentoo.org/glsa/201603-15 | |
https://security.netapp.com/advisory/ntap-20160301-0001/ | |
https://www.arista.com/en/support/advisories-notices/security-advisories/1260... | |
https://www.kb.cert.org/vuls/id/583776 | |
https://www.openssl.org/news/secadv/20160301.txt |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1 | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1a | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1b | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1c | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1d | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1e | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1f | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1g | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1h | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1i | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1j | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1k | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1l | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1m | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1n | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1o | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1p | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1q | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.1r | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.2 | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.2a | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.2b | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.2c | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.2d | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.2e | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 1.0.2f | - | |||||
运行在以下环境 | |||||||||
应用 | pulsesecure | client | - | - | |||||
运行在以下环境 | |||||||||
应用 | pulsesecure | steel_belted_radius | - | - | |||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 3.13 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_5 | openssl | * |
Up to (excluding) 0:0.9.8e-39.el5_11 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | openssl | * |
Up to (excluding) 0:1.0.1e-42.el6_7.4 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | openssl098e | * |
Up to (excluding) 0:0.9.8e-20.el6_7.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12 | libopenssl-devel | * |
Up to (excluding) 1.0.2j-55 |
|||||
- 攻击路径 远程
- 攻击复杂度 困难
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...