|
12 | 12 | "CAM_WidelyKnown": "16", |
13 | 13 | "CERTAdvisory": "", |
14 | 14 | "CVEIDs": "CVE-2003-0131", |
15 | | - "CVSS_AccessComplexity": "", |
16 | | - "CVSS_AccessVector": "", |
17 | | - "CVSS_Authenication": "", |
18 | | - "CVSS_AvailabilityImpact": "", |
19 | | - "CVSS_BaseScore": "", |
20 | | - "CVSS_BaseVector": "", |
21 | | - "CVSS_CollateralDamagePotential": "", |
22 | | - "CVSS_ConfidentialityImpact": "", |
23 | | - "CVSS_EnvironmentalScore": "", |
24 | | - "CVSS_EnvironmentalVector": "", |
25 | | - "CVSS_Exploitability": "", |
26 | | - "CVSS_IntegrityImpact": "", |
27 | | - "CVSS_RemediationLevel": "", |
28 | | - "CVSS_ReportConfidence": "", |
29 | | - "CVSS_SecurityRequirementsAR": "", |
30 | | - "CVSS_SecurityRequirementsCR": "", |
31 | | - "CVSS_SecurityRequirementsIR": "", |
32 | | - "CVSS_TargetDistribution": "", |
33 | | - "CVSS_TemporalScore": "", |
34 | | - "CVSS_TemporalVector": "", |
| 15 | + "CVSS_AccessComplexity": "--", |
| 16 | + "CVSS_AccessVector": "--", |
| 17 | + "CVSS_Authenication": "--", |
| 18 | + "CVSS_AvailabilityImpact": "--", |
| 19 | + "CVSS_BaseScore": 0, |
| 20 | + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", |
| 21 | + "CVSS_CollateralDamagePotential": "ND", |
| 22 | + "CVSS_ConfidentialityImpact": "--", |
| 23 | + "CVSS_EnvironmentalScore": 0, |
| 24 | + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", |
| 25 | + "CVSS_Exploitability": "ND", |
| 26 | + "CVSS_IntegrityImpact": "--", |
| 27 | + "CVSS_RemediationLevel": "ND", |
| 28 | + "CVSS_ReportConfidence": "ND", |
| 29 | + "CVSS_SecurityRequirementsAR": "ND", |
| 30 | + "CVSS_SecurityRequirementsCR": "ND", |
| 31 | + "CVSS_SecurityRequirementsIR": "ND", |
| 32 | + "CVSS_TargetDistribution": "ND", |
| 33 | + "CVSS_TemporalScore": 0, |
| 34 | + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", |
35 | 35 | "DateCreated": "2003-03-20T10:50:53-04:00", |
36 | 36 | "DateFirstPublished": "2003-04-22T20:20:53-04:00", |
37 | | - "DateLastUpdated": "2005-06-06T18:34:00-04:00", |
| 37 | + "DateLastUpdated": "2017-11-12T23:58:00-05:00", |
38 | 38 | "DatePublic": "2003-03-19T00:00:00", |
39 | 39 | "Description": "", |
40 | 40 | "ID": "VU#888801", |
|
72 | 72 | "http://www.ietf.org/rfc/rfc2409.txt" |
73 | 73 | ], |
74 | 74 | "Resolution": "Upgrade or Patch Upgrade or apply a patch as specified by your vendor. In order to defeat this specific attack, an SSL/TLS server must not respond distinctively when a premaster secret sent by the client contains an incorrect or unexpected SSL/TLS version number. The paper recommends that an SSL/TLS server always replace the client-provided version number with the expected version number as determined from either the Client hello or Server hello messages (section 6.2).", |
75 | | - "Revision": 50, |
| 75 | + "Revision": 51, |
76 | 76 | "SystemsAffectedPreamble": "", |
77 | 77 | "ThanksAndCredit": "This vulnerability was researched and documented by Vlastimil Kl\u00edma, Ond\u0159ej Pokorn\u00fd, and Tom\u00e1\u0161 Rosa.", |
78 | 78 | "Title": "SSL/TLS implementations disclose side channel information via PKCS #1 v1.5 version number extension", |
79 | 79 | "US-CERTTechnicalAlert": "", |
80 | | - "VRDA_D1_DirectReport": "", |
| 80 | + "VRDA_D1_DirectReport": "1", |
81 | 81 | "VRDA_D1_Impact": "", |
82 | 82 | "VRDA_D1_Population": "", |
83 | 83 | "VulnerabilityCount": 1, |
|
0 commit comments