Lucene search

K
rubygemsRubySecRUBY:OPENSSL-2016-7798
HistoryOct 23, 2017 - 9:00 p.m.

Incorrect handling of initialization vector in the GCM mode in OpenSSL

2017-10-2321:00:00
RubySec
github.com
11

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

The openssl gem for Ruby uses the same initialization vector (IV) in
GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for
context-dependent attackers to bypass the encryption protection mechanism.

Affected configurations

Vulners
Node
rubyopensslRange≤2.0.0
VendorProductVersionCPE
rubyopenssl*cpe:2.3:a:ruby:openssl:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N