OpenSSL CBC information disclosure

openssl-cbc-info-disclosure (72128) The risk level is classified as LowLow Risk


OpenSSL could allow a remote attacker to obtain sensitive information, caused by the exposure of timing differences during decryption processing by the CBC mode encryption. An attacker could exploit this vulnerability via a Vaudenay padding oracle attack to recover the plaintext.


Base Score: 4.3
  Access Vector: Network
  Access Complexity: Medium
  Authentication: None
  Confidentiality Impact: Partial
  Integrity Impact: None
  Availability Impact: None
Temporal Score: 3.2
  Exploitability: Unproven
  Remediation Level: Official-Fix
  Report Confidence: Confirmed


Obtain Information


Upgrade to the latest version of OpenSSL (0.9.8s or 1.0.0f or later), available from the OpenSSL Web site. See References.

Refer to the appropriate IBM Security Bulletin for patch, upgrade or suggested workaround information. See References.

For other distributions:
Apply the appropriate update for your system. See References.


Platforms Affected:

  • Apple Mac OS X Lion 10.8
  • Apple Mac OS X Lion 10.8.1
  • Apple Mac OS X Lion 10.8.2
  • Apple Mac OS X Lion 10.8.3
  • IBM AIX 5.3
  • IBM AIX 6.1
  • IBM AIX 7.1
  • IBM DS8870 7.0
  • IBM DS8870 7.1
  • IBM InfoSphere Balanced Warehouse C3000
  • IBM InfoSphere Balanced Warehouse C4000
  • IBM InfoSphere Balanced Warehouse C5100
  • IBM Netcool System Service Monitor 4.0
  • IBM Power Hardware Management Console 7r7.6.0
  • IBM Smart Analytics System 1050 Linux
  • IBM Smart Analytics System 2050 Linux
  • IBM Smart Analytics System 5600 V1
  • IBM Smart Analytics System 5600 V2
  • IBM Smart Analytics System 5710 9.7
  • IBM Smart Analytics System 7600 9.7
  • IBM Smart Analytics System 7700 9.7
  • IBM Smart Analytics System 7710 9.7
  • IBM Sterling Connect Enterprise for UNIX 1.4
  • IBM Sterling Connect Enterprise for UNIX 1.5
  • IBM Sterling Connect Enterprise for UNIX 2.4
  • IBM Sterling Connect Enterprise for UNIX 2.5
  • IBM Tivoli Netcool/OMNIbus 7.2.1
  • IBM Tivoli Netcool/OMNIbus 7.3.0
  • IBM Tivoli Netcool/OMNIbus 7.3.1
  • IBM Tivoli Netcool/OMNIbus 7.4.0
  • IBM Tivoli Network Manager 3.8 FP7
  • IBM Tivoli Network Manager 3.9 FP3
  • OpenSSL OpenSSL 0.9.8a
  • OpenSSL OpenSSL 0.9.8b
  • OpenSSL OpenSSL 0.9.8c
  • OpenSSL OpenSSL 0.9.8d
  • OpenSSL OpenSSL 0.9.8e
  • OpenSSL OpenSSL 0.9.8f
  • OpenSSL OpenSSL 0.9.8g
  • OpenSSL OpenSSL 0.9.8h
  • OpenSSL OpenSSL 0.9.8i
  • OpenSSL OpenSSL 0.9.8j
  • OpenSSL OpenSSL 0.9.8k
  • OpenSSL OpenSSL 0.9.8l
  • OpenSSL OpenSSL 0.9.8m
  • OpenSSL OpenSSL 0.9.8N
  • OpenSSL OpenSSL 0.9.8O
  • OpenSSL OpenSSL 0.9.8P
  • OpenSSL OpenSSL 0.9.8Q
  • OpenSSL OpenSSL 1.0.0
  • OpenSSL OpenSSL 1.0.0a
  • OpenSSL OpenSSL 1.0.0B
  • OpenSSL OpenSSL 1.0.0c
  • OpenSSL OpenSSL 1.0.0d
  • RedHat Enterprise Linux 5
  • RedHat Enterprise Linux 5 Client Workstation
  • RedHat Enterprise Linux 5 Client
  • RedHat Enterprise Linux 6 Workstation
  • RedHat Enterprise Linux 6 Server
  • RedHat Enterprise Linux Desktop 6
  • RedHat Enterprise Linux HPC Node 6


Jan 04, 2012

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page