CVE-2003-0078

NameCVE-2003-0078
Descriptionssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-253

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssl (PTS)bullseye1.1.1w-0+deb11u1fixed
bullseye (security)1.1.1w-0+deb11u4fixed
bookworm3.0.17-1~deb12u2fixed
bookworm (security)3.0.17-1~deb12u3fixed
trixie3.5.1-1fixed
trixie (security)3.5.1-1+deb13u1fixed
forky, sid3.5.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensslsourcewoody0.9.6c-2.woody.2DSA-253
opensslsource(unstable)0.9.7a-1

Search for package or bug name: Reporting problems