Vulnerabilities > CVE-2006-4343 - NULL Pointer Dereference vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
openssl
debian
canonical
CWE-476
nessus
exploit available

Summary

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.

Common Weakness Enumeration (CWE)

Exploit-Db

  • descriptionOpenSSL SSLv2 Null Pointer Dereference Client Denial of Service Vulnerability. CVE-2006-4343. Dos exploits for multiple platform
    idEDB-ID:28726
    last seen2016-02-03
    modified2006-09-28
    published2006-09-28
    reporterNoam Rathaus
    sourcehttps://www.exploit-db.com/download/28726/
    titleOpenSSL SSLv2 - Null Pointer Dereference Client Denial of Service Vulnerability
  • descriptionOpenSSL < 0.9.7l / 0.9.8d SSLv2 Client Crash Exploit. CVE-2006-4343. Dos exploits for multiple platform
    fileexploits/multiple/dos/4773.pl
    idEDB-ID:4773
    last seen2016-01-31
    modified2007-12-23
    platformmultiple
    port
    published2007-12-23
    reporterNoam Rathaus
    sourcehttps://www.exploit-db.com/download/4773/
    titleOpenSSL < 0.9.7l / 0.9.8d - SSLv2 Client Crash Exploit
    typedos

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200610-11.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200610-11 (OpenSSL: Multiple vulnerabilities) Tavis Ormandy and Will Drewry, both of the Google Security Team, discovered that the SSL_get_shared_ciphers() function contains a buffer overflow vulnerability, and that the SSLv2 client code contains a flaw leading to a crash. Additionally Dr. Stephen N. Henson found that the ASN.1 handler contains two Denial of Service vulnerabilities: while parsing an invalid ASN.1 structure and while handling certain types of public key. Impact : An attacker could trigger the buffer overflow vulnerability by sending a malicious suite of ciphers to an application using the vulnerable function, and thus execute arbitrary code with the rights of the user running the application. An attacker could also consume CPU and/or memory by exploiting the Denial of Service vulnerabilities. Finally a malicious server could crash a SSLv2 client through the SSLv2 vulnerability. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id22914
    published2006-10-25
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22914
    titleGLSA-200610-11 : OpenSSL: Multiple vulnerabilities
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 200610-11.
    #
    # The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(22914);
      script_version("1.14");
      script_cvs_date("Date: 2019/08/02 13:32:43");
    
      script_cve_id("CVE-2006-2937", "CVE-2006-2940", "CVE-2006-3738", "CVE-2006-4343");
      script_xref(name:"GLSA", value:"200610-11");
    
      script_name(english:"GLSA-200610-11 : OpenSSL: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-200610-11
    (OpenSSL: Multiple vulnerabilities)
    
        Tavis Ormandy and Will Drewry, both of the Google Security Team,
        discovered that the SSL_get_shared_ciphers() function contains a buffer
        overflow vulnerability, and that the SSLv2 client code contains a flaw
        leading to a crash. Additionally Dr. Stephen N. Henson found that the
        ASN.1 handler contains two Denial of Service vulnerabilities: while
        parsing an invalid ASN.1 structure and while handling certain types of
        public key.
      
    Impact :
    
        An attacker could trigger the buffer overflow vulnerability by sending
        a malicious suite of ciphers to an application using the vulnerable
        function, and thus execute arbitrary code with the rights of the user
        running the application. An attacker could also consume CPU and/or
        memory by exploiting the Denial of Service vulnerabilities. Finally a
        malicious server could crash a SSLv2 client through the SSLv2
        vulnerability.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/200610-11"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All OpenSSL 0.9.8 users should upgrade to the latest version:
        # emerge --sync
        # emerge --ask --oneshot --verbose '>=dev-libs/openssl-0.9.8d'
        All OpenSSL 0.9.7 users should upgrade to the latest version:
        # emerge --sync
        # emerge --ask --oneshot --verbose '>=dev-libs/openssl-0.9.7l'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_cwe_id(119, 399);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:openssl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/10/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/10/25");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/09/28");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"dev-libs/openssl", unaffected:make_list("ge 0.9.8d", "rge 0.9.7l"), vulnerable:make_list("lt 0.9.8d"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "OpenSSL");
    }
    
  • NASL familyWeb Servers
    NASL idOPENSSL_0_9_8M.NASL
    descriptionAccording to its banner, the remote web server uses a version of OpenSSL older than 0.9.8m. Such versions have the following vulnerabilities : - Session renegotiations are not handled properly, which could be exploited to insert arbitrary plaintext by a man-in-the-middle. (CVE-2009-3555) - The library does not check for a NULL return value from calls to the bn_wexpand() function, which has unspecified impact. (CVE-2009-3245) - A memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c allows remote attackers to cause a denial of service via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function. (CVE-2008-1678, CVE-2009-4355) For this vulnerability to be exploitable, compression must be enabled in OpenSSL for SSL/TLS connections.
    last seen2020-06-01
    modified2020-06-02
    plugin id45039
    published2010-03-11
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45039
    titleOpenSSL < 0.9.8m Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    
    if (description)
    {
      script_id(45039);
      script_version("1.17");
      script_cvs_date("Date: 2018/11/15 20:50:25");
    
      script_cve_id("CVE-2006-4343", "CVE-2008-1678", "CVE-2009-3245", "CVE-2009-3555", "CVE-2009-4355");
      script_bugtraq_id(31692, 36935, 38562);
      script_xref(name:"Secunia", value:"37291");
      script_xref(name:"Secunia", value:"38200");
    
      script_name(english:"OpenSSL < 0.9.8m Multiple Vulnerabilities");
      script_summary(english:"Does a banner check");
    
      script_set_attribute(
        attribute:"synopsis",
        value:"The remote web server has multiple SSL-related vulnerabilities."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "According to its banner, the remote web server uses a version of
    OpenSSL older than 0.9.8m.  Such versions have the following
    vulnerabilities :
    
      - Session renegotiations are not handled properly, which could
        be exploited to insert arbitrary plaintext by a
        man-in-the-middle. (CVE-2009-3555)
    
      - The library does not check for a NULL return value from calls
        to the bn_wexpand() function, which has unspecified impact.
        (CVE-2009-3245)
       
      - A memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c 
        allows remote attackers to cause a denial of service via vectors that 
        trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function.
        (CVE-2008-1678, CVE-2009-4355)
        
        For this vulnerability to be exploitable, compression must be enabled in OpenSSL
        for SSL/TLS connections.    
    "
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://rt.openssl.org/Ticket/Display.html?id=2111&user=guest&pass=guest"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://marc.info/?l=openssl-announce&m=126714485629486&w=2"
      );
      script_set_attribute(attribute:"solution", value:"Upgrade to OpenSSL 0.9.8m or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_cwe_id(20, 310, 399);
      script_set_attribute(attribute:"vuln_publication_date",value:"2009/11/09");
      script_set_attribute(attribute:"patch_publication_date",value:"2010/02/25");
      script_set_attribute(attribute:"plugin_publication_date",value:"2010/03/11");
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:openssl:openssl");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Web Servers");
    
      script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");
    
      script_dependencie("http_version.nasl");
      script_require_ports("Services/www", 443);
      script_require_keys("Settings/ParanoidReport");
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    include("backport.inc");
    
    
    if (report_paranoia < 2)
      exit(1, "This plugin only runs if 'Report paranoia' is set to 'Paranoid'.");
    
    port = get_http_port(default:80);
    banner = get_backport_banner(banner:get_http_banner(port:port));
    if (!banner) exit(1, "Unable to get the banner from web server on port "+port+".");
    
    if (!egrep(string:banner, pattern:'^Server:'))
      exit(0, "The web server on port "+port+" doesn't return a Server response header.");
    if ("OpenSSL/" >!< banner)
      exit(0, "The Server response header for the web server on port "+port+" doesn't mention OpenSSL.");
    
    pat = "^Server:.*OpenSSL/([^ ]+)";
    version = NULL;
    
    foreach line (split(banner, sep:'\r\n', keep:FALSE))
    {
      match = eregmatch(pattern:pat, string:line);
      if (!isnull(match))
      {
        version = match[1];
        break;
      }
    }
    
    if (isnull(version))
      exit(0, "Failed to extract the version of OpenSSL used by the web server on port "+port+".");
    
    # anything less than 0.9.8m, and anything that looks like 0.9.8-beta
    if (version =~ "^0\.9\.([0-7]|8([^a-z0-9]|[a-l]|$))")
    {
      if (report_verbosity > 0)
      {
        report =
          '\nOpenSSL version '+version+' appears to be running on the remote\n'+
          'host based on the following Server response header :\n\n'+
          '  '+line+'\n';
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
      exit(0);
    }
    else exit(0, 'The web server on port "+port+" uses OpenSSL '+version+', which is not affected.');
    
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0020_OPENSSL098E.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has openssl098e packages installed that are affected by multiple vulnerabilities: - OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition. (CVE-2006-2937) - OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) public exponent or (2) public modulus values in X.509 certificates that require extra time to process when using RSA signature verification. (CVE-2006-2940) - Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers. (CVE-2006-3738) - OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. (CVE-2006-4339) - The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference. (CVE-2006-4343) - The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys. (CVE-2007-3108) - Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors. (CVE-2007-4995) - Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible. (CVE-2007-5135) - OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys. (CVE-2008-5077) - The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length. (CVE-2009-0590) - The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of future epoch DTLS records that are buffered in a queue, aka DTLS record buffer limitation bug. (CVE-2009-1377) - Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka DTLS fragment handling memory leak. (CVE-2009-1378) - Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate. (CVE-2009-1379) - ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello. (CVE-2009-1386) - The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of- sequence DTLS handshake message, related to a fragment bug. (CVE-2009-1387) - The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large. (CVE-2009-2409) - OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors. (CVE-2009-3245) - The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post- renegotiation context, related to a plaintext injection attack, aka the Project Mogul issue. (CVE-2009-3555) - Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678. (CVE-2009-4355) - The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot. (CVE-2010-0433) - The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. (CVE-2012-2110) - The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the- middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a CRIME attack. (CVE-2012-4929) - OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key. (CVE-2013-0166) - The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side- channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the Lucky Thirteen issue. (CVE-2013-0169) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127177
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127177
    titleNewStart CGSL CORE 5.04 / MAIN 5.04 : openssl098e Multiple Vulnerabilities (NS-SA-2019-0020)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # The descriptive text and package checks in this plugin were
    # extracted from ZTE advisory NS-SA-2019-0020. The text
    # itself is copyright (C) ZTE, Inc.
    
    include("compat.inc");
    
    if (description)
    {
      script_id(127177);
      script_version("1.3");
      script_cvs_date("Date: 2019/09/24 11:01:33");
    
      script_cve_id(
        "CVE-2006-2937",
        "CVE-2006-2940",
        "CVE-2006-3738",
        "CVE-2006-4339",
        "CVE-2006-4343",
        "CVE-2007-3108",
        "CVE-2007-4995",
        "CVE-2007-5135",
        "CVE-2008-5077",
        "CVE-2009-0590",
        "CVE-2009-1377",
        "CVE-2009-1378",
        "CVE-2009-1379",
        "CVE-2009-1386",
        "CVE-2009-1387",
        "CVE-2009-2409",
        "CVE-2009-3245",
        "CVE-2009-3555",
        "CVE-2009-4355",
        "CVE-2010-0433",
        "CVE-2012-2110",
        "CVE-2012-4929",
        "CVE-2013-0166",
        "CVE-2013-0169"
      );
    
      script_name(english:"NewStart CGSL CORE 5.04 / MAIN 5.04 : openssl098e Multiple Vulnerabilities (NS-SA-2019-0020)");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote machine is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has openssl098e packages installed that are
    affected by multiple vulnerabilities:
    
      - OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d
        allows remote attackers to cause a denial of service
        (infinite loop and memory consumption) via malformed
        ASN.1 structures that trigger an improperly handled
        error condition. (CVE-2006-2937)
    
      - OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and
        earlier versions allows attackers to cause a denial of
        service (CPU consumption) via parasitic public keys with
        large (1) public exponent or (2) public modulus
        values in X.509 certificates that require extra time to
        process when using RSA signature verification.
        (CVE-2006-2940)
    
      - Buffer overflow in the SSL_get_shared_ciphers function
        in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and
        earlier versions has unspecified impact and remote
        attack vectors involving a long list of ciphers.
        (CVE-2006-3738)
    
      - OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8
        before 0.9.8c, when using an RSA key with exponent 3,
        removes PKCS-1 padding before generating a hash, which
        allows remote attackers to forge a PKCS #1 v1.5
        signature that is signed by that RSA key and prevents
        OpenSSL from correctly verifying X.509 and other
        certificates that use PKCS #1. (CVE-2006-4339)
    
      - The get_server_hello function in the SSLv2 client code
        in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and
        earlier versions allows remote servers to cause a denial
        of service (client crash) via unknown vectors that
        trigger a null pointer dereference. (CVE-2006-4343)
    
      - The BN_from_montgomery function in crypto/bn/bn_mont.c
        in OpenSSL 0.9.8e and earlier does not properly perform
        Montgomery multiplication, which might allow local users
        to conduct a side-channel attack and retrieve RSA
        private keys. (CVE-2007-3108)
    
      - Off-by-one error in the DTLS implementation in OpenSSL
        0.9.8 before 0.9.8f allows remote attackers to execute
        arbitrary code via unspecified vectors. (CVE-2007-4995)
    
      - Off-by-one error in the SSL_get_shared_ciphers function
        in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f,
        might allow remote attackers to execute arbitrary code
        via a crafted packet that triggers a one-byte buffer
        underflow. NOTE: this issue was introduced as a result
        of a fix for CVE-2006-3738. As of 20071012, it is
        unknown whether code execution is possible.
        (CVE-2007-5135)
    
      - OpenSSL 0.9.8i and earlier does not properly check the
        return value from the EVP_VerifyFinal function, which
        allows remote attackers to bypass validation of the
        certificate chain via a malformed SSL/TLS signature for
        DSA and ECDSA keys. (CVE-2008-5077)
    
      - The ASN1_STRING_print_ex function in OpenSSL before
        0.9.8k allows remote attackers to cause a denial of
        service (invalid memory access and application crash)
        via vectors that trigger printing of a (1) BMPString or
        (2) UniversalString with an invalid encoded length.
        (CVE-2009-0590)
    
      - The dtls1_buffer_record function in ssl/d1_pkt.c in
        OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote
        attackers to cause a denial of service (memory
        consumption) via a large series of future epoch DTLS
        records that are buffered in a queue, aka DTLS record
        buffer limitation bug. (CVE-2009-1377)
    
      - Multiple memory leaks in the
        dtls1_process_out_of_seq_message function in
        ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8
        versions allow remote attackers to cause a denial of
        service (memory consumption) via DTLS records that (1)
        are duplicates or (2) have sequence numbers much greater
        than current sequence numbers, aka DTLS fragment
        handling memory leak. (CVE-2009-1378)
    
      - Use-after-free vulnerability in the
        dtls1_retrieve_buffered_fragment function in
        ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote
        attackers to cause a denial of service (openssl s_client
        crash) and possibly have unspecified other impact via a
        DTLS packet, as demonstrated by a packet from a server
        that uses a crafted server certificate. (CVE-2009-1379)
    
      - ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote
        attackers to cause a denial of service (NULL pointer
        dereference and daemon crash) via a DTLS
        ChangeCipherSpec packet that occurs before ClientHello.
        (CVE-2009-1386)
    
      - The dtls1_retrieve_buffered_fragment function in
        ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows
        remote attackers to cause a denial of service (NULL
        pointer dereference and daemon crash) via an out-of-
        sequence DTLS handshake message, related to a fragment
        bug. (CVE-2009-1387)
    
      - The Network Security Services (NSS) library before
        3.12.3, as used in Firefox; GnuTLS before 2.6.4 and
        2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products
        support MD2 with X.509 certificates, which might allow
        remote attackers to spoof certificates by using MD2
        design flaws to generate a hash collision in less than
        brute-force time. NOTE: the scope of this issue is
        currently limited because the amount of computation
        required is still large. (CVE-2009-2409)
    
      - OpenSSL before 0.9.8m does not check for a NULL return
        value from bn_wexpand function calls in (1)
        crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3)
        crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which
        has unspecified impact and context-dependent attack
        vectors. (CVE-2009-3245)
    
      - The TLS protocol, and the SSL protocol 3.0 and possibly
        earlier, as used in Microsoft Internet Information
        Services (IIS) 7.0, mod_ssl in the Apache HTTP Server
        2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5
        and earlier, Mozilla Network Security Services (NSS)
        3.12.4 and earlier, multiple Cisco products, and other
        products, does not properly associate renegotiation
        handshakes with an existing connection, which allows
        man-in-the-middle attackers to insert data into HTTPS
        sessions, and possibly other types of sessions protected
        by TLS or SSL, by sending an unauthenticated request
        that is processed retroactively by a server in a post-
        renegotiation context, related to a plaintext
        injection attack, aka the Project Mogul issue.
        (CVE-2009-3555)
    
      - Memory leak in the zlib_stateful_finish function in
        crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and
        1.0.0 Beta through Beta 4 allows remote attackers to
        cause a denial of service (memory consumption) via
        vectors that trigger incorrect calls to the
        CRYPTO_cleanup_all_ex_data function, as demonstrated by
        use of SSLv3 and PHP with the Apache HTTP Server, a
        related issue to CVE-2008-1678. (CVE-2009-4355)
    
      - The kssl_keytab_is_available function in ssl/kssl.c in
        OpenSSL before 0.9.8n, when Kerberos is enabled but
        Kerberos configuration files cannot be opened, does not
        check a certain return value, which allows remote
        attackers to cause a denial of service (NULL pointer
        dereference and daemon crash) via SSL cipher
        negotiation, as demonstrated by a chroot installation of
        Dovecot or stunnel without Kerberos configuration files
        inside the chroot. (CVE-2010-0433)
    
      - The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c
        in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1
        before 1.0.1a does not properly interpret integer data,
        which allows remote attackers to conduct buffer overflow
        attacks, and cause a denial of service (memory
        corruption) or possibly have unspecified other impact,
        via crafted DER data, as demonstrated by an X.509
        certificate or an RSA public key. (CVE-2012-2110)
    
      - The TLS protocol 1.2 and earlier, as used in Mozilla
        Firefox, Google Chrome, Qt, and other products, can
        encrypt compressed data without properly obfuscating the
        length of the unencrypted data, which allows man-in-the-
        middle attackers to obtain plaintext HTTP headers by
        observing length differences during a series of guesses
        in which a string in an HTTP request potentially matches
        an unknown string in an HTTP header, aka a CRIME
        attack. (CVE-2012-4929)
    
      - OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1
        before 1.0.1d does not properly perform signature
        verification for OCSP responses, which allows remote
        OCSP servers to cause a denial of service (NULL pointer
        dereference and application crash) via an invalid key.
        (CVE-2013-0166)
    
      - The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0
        and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and
        other products, do not properly consider timing side-
        channel attacks on a MAC check requirement during the
        processing of malformed CBC padding, which allows remote
        attackers to conduct distinguishing attacks and
        plaintext-recovery attacks via statistical analysis of
        timing data for crafted packets, aka the Lucky
        Thirteen issue. (CVE-2013-0169)
    
    Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
    number.");
      script_set_attribute(attribute:"see_also", value:"http://security.gd-linux.com/notice/NS-SA-2019-0020");
      script_set_attribute(attribute:"solution", value:
    "Upgrade the vulnerable CGSL openssl098e packages. Note that updated packages may not be available yet. Please contact
    ZTE for more information.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2009-3245");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_cwe_id(20, 119, 189, 310, 399);
    
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/09/05");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/07/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/08/12");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"NewStart CGSL Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/ZTE-CGSL/release", "Host/ZTE-CGSL/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/ZTE-CGSL/release");
    if (isnull(release) || release !~ "^CGSL (MAIN|CORE)") audit(AUDIT_OS_NOT, "NewStart Carrier Grade Server Linux");
    
    if (release !~ "CGSL CORE 5.04" &&
        release !~ "CGSL MAIN 5.04")
      audit(AUDIT_OS_NOT, 'NewStart CGSL CORE 5.04 / NewStart CGSL MAIN 5.04');
    
    if (!get_kb_item("Host/ZTE-CGSL/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "NewStart Carrier Grade Server Linux", cpu);
    
    flag = 0;
    
    pkgs = {
      "CGSL CORE 5.04": [
        "openssl098e-0.9.8e-29.el7.centos.3",
        "openssl098e-debuginfo-0.9.8e-29.el7.centos.3"
      ],
      "CGSL MAIN 5.04": [
        "openssl098e-0.9.8e-29.el7.centos.3",
        "openssl098e-debuginfo-0.9.8e-29.el7.centos.3"
      ]
    };
    pkg_list = pkgs[release];
    
    foreach (pkg in pkg_list)
      if (rpm_check(release:"ZTE " + release, reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openssl098e");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2008-0264.NASL
    descriptionRed Hat Network Satellite Server version 5.0.2 is now available. This update includes fixes for a number of security issues in Red Hat Network Satellite Server Solaris client components. This update has been rated as having moderate security impact by the Red Hat Security Response Team. This release corrects several security vulnerabilities in various components shipped as part of the Red Hat Network Satellite Server Solaris client. In a typical operating environment, these components are not used by the Satellite Server in a vulnerable manner. These security updates will reduce risk should these components be used by other applications. Two denial-of-service flaws were fixed in ZLib. (CVE-2005-2096, CVE-2005-1849) Multiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339, CVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969) Multiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052, CVE-2006-4980, CVE-2006-1542) Users of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to 5.0.2, which resolves these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id43836
    published2010-01-10
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43836
    titleRHEL 4 : Solaris client in Satellite Server (RHSA-2008:0264)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2006-272-01.NASL
    descriptionNew openssl packages are available for Slackware 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix security issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id22467
    published2006-09-29
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22467
    titleSlackware 10.0 / 10.1 / 10.2 / 9.0 / 9.1 / current : openssl (SSA:2006-272-01)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_COMPAT-OPENSSL097G-2163.NASL
    descriptionA buffer overflow condition within the SSL_get_shared_ciphers() function and a DoS condition known as
    last seen2020-06-01
    modified2020-06-02
    plugin id29405
    published2007-12-13
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/29405
    titleSuSE 10 Security Update : compat-openssl097g (ZYPP Patch Number 2163)
  • NASL familyMisc.
    NASL idXEROX_XRX07_001.NASL
    descriptionAccording to its model number and software version, the remote host is a Xerox WorkCentre device that reportedly suffers from multiple issues in the ESS / Network Controller that could allow remote execution of arbitrary code on the affected device, initiation of denial of service attacks, and forgery of digital certificates.
    last seen2020-06-01
    modified2020-06-02
    plugin id25637
    published2007-07-01
    reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/25637
    titleXerox WorkCentre Multiple OpenSSL Vulnerabilities (XRX07-001)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_121229-02.NASL
    descriptionSunOS 5.10: libssl patch. Date this patch was last updated by Sun : Apr/23/07
    last seen2020-06-01
    modified2020-06-02
    plugin id107376
    published2018-03-12
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/107376
    titleSolaris 10 (sparc) : 121229-02
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2006-0695.NASL
    descriptionUpdated OpenSSL packages are now available to correct several security issues. This update has been rated as having important security impact by the Red Hat Security Response Team. The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols. Tavis Ormandy and Will Drewry of the Google Security Team discovered a buffer overflow in the SSL_get_shared_ciphers() utility function. An attacker could send a list of ciphers to an application that used this function and overrun a buffer (CVE-2006-3738). Few applications make use of this vulnerable function and generally it is used only when applications are compiled for debugging. Tavis Ormandy and Will Drewry of the Google Security Team discovered a flaw in the SSLv2 client code. When a client application used OpenSSL to create an SSLv2 connection to a malicious server, that server could cause the client to crash. (CVE-2006-4343) Dr S. N. Henson of the OpenSSL core team and Open Network Security recently developed an ASN.1 test suite for NISCC (www.niscc.gov.uk) which uncovered denial of service vulnerabilities : * Certain public key types can take disproportionate amounts of time to process, leading to a denial of service. (CVE-2006-2940) * During parsing of certain invalid ASN.1 structures an error condition was mishandled. This can result in an infinite loop which consumed system memory (CVE-2006-2937). This issue does not affect the OpenSSL version distributed in Red Hat Enterprise Linux 2.1. These vulnerabilities can affect applications which use OpenSSL to parse ASN.1 data from untrusted sources, including SSL servers which enable client authentication and S/MIME applications. Users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. Note: After installing this update, users are advised to either restart all services that use OpenSSL or restart their system.
    last seen2020-06-01
    modified2020-06-02
    plugin id22472
    published2006-09-29
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/22472
    titleRHEL 2.1 / 3 / 4 : openssl (RHSA-2006:0695)
  • NASL familyWindows
    NASL idVMWARE_MULTIPLE_VMSA_2008_0005.NASL
    descriptionVMware products installed on the remote host are affected by multiple vulnerabilities : - The
    last seen2020-06-01
    modified2020-06-02
    plugin id31729
    published2008-04-02
    reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/31729
    titleVMware Products Multiple Vulnerabilities (VMSA-2008-0005)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS9_113713.NASL
    descriptionSunOS 5.9: pkg utilities Patch. Date this patch was last updated by Sun : Apr/05/11
    last seen2020-06-01
    modified2020-06-02
    plugin id13543
    published2004-07-12
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/13543
    titleSolaris 9 (sparc) : 113713-30
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-353-1.NASL
    descriptionDr. Henson of the OpenSSL core team and Open Network Security discovered a mishandled error condition in the ASN.1 parser. By sending specially crafted packet data, a remote attacker could exploit this to trigger an infinite loop, which would render the service unusable and consume all available system memory. (CVE-2006-2937) Certain types of public key could take disproportionate amounts of time to process. The library now limits the maximum key exponent size to avoid Denial of Service attacks. (CVE-2006-2940) Tavis Ormandy and Will Drewry of the Google Security Team discovered a buffer overflow in the SSL_get_shared_ciphers() function. By sending specially crafted packets to applications that use this function (like Exim, MySQL, or the openssl command line tool), a remote attacker could exploit this to execute arbitrary code with the server
    last seen2020-06-01
    modified2020-06-02
    plugin id27933
    published2007-11-10
    reporterUbuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/27933
    titleUbuntu 5.04 / 5.10 / 6.06 LTS : openssl vulnerabilities (USN-353-1)
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL8106.NASL
    descriptionF5 Product Development has determined that the BIG-IP and Enterprise Manager products use a vulnerable version of OpenSSL; however, the vulnerable code is not used in either TMM or in Apache on the BIG-IP system. The vulnerability is considered to be a local vulnerability and cannot be exploited remotely.
    last seen2020-06-01
    modified2020-06-02
    plugin id86017
    published2015-09-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86017
    titleF5 Networks BIG-IP : OpenSSL SSL_get_shared_ciphers vulnerability (SOL8106)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1185.NASL
    descriptionThe fix used to correct CVE-2006-2940 introduced code that could lead to the use of uninitialized memory. Such use is likely to cause the application using the openssl library to crash, and has the potential to allow an attacker to cause the execution of arbitrary code. For reference please find below the original advisory text : Multiple vulnerabilities have been discovered in the OpenSSL cryptographic software package that could allow an attacker to launch a denial of service attack by exhausting system resources or crashing processes on a victim
    last seen2020-06-01
    modified2020-06-02
    plugin id22727
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22727
    titleDebian DSA-1185-2 : openssl - denial of service
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2006-0661.NASL
    descriptionUpdated OpenSSL packages are now available to correct several security issues. This update has been rated as having important security impact by the Red Hat Security Response Team. The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols. These vulnerabilities can affect applications which use OpenSSL to parse ASN.1 data from untrusted sources, including SSL servers which enable client authentication and S/MIME applications. Users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. Note: After installing this update, users are advised to either restart all services that use OpenSSL or restart their system. From Red Hat Security Advisory 2006:0695 : Tavis Ormandy and Will Drewry of the Google Security Team discovered a buffer overflow in the SSL_get_shared_ciphers() utility function. An attacker could send a list of ciphers to an application that used this function and overrun a buffer (CVE-2006-3738). Few applications make use of this vulnerable function and generally it is used only when applications are compiled for debugging. Tavis Ormandy and Will Drewry of the Google Security Team discovered a flaw in the SSLv2 client code. When a client application used OpenSSL to create an SSLv2 connection to a malicious server, that server could cause the client to crash. (CVE-2006-4343) Dr S. N. Henson of the OpenSSL core team and Open Network Security recently developed an ASN.1 test suite for NISCC (www.niscc.gov.uk) which uncovered denial of service vulnerabilities : * Certain public key types can take disproportionate amounts of time to process, leading to a denial of service. (CVE-2006-2940) * During parsing of certain invalid ASN.1 structures an error condition was mishandled. This can result in an infinite loop which consumed system memory (CVE-2006-2937). This issue does not affect the OpenSSL version distributed in Red Hat Enterprise Linux 2.1. From Red Hat Security Advisory 2006:0661 : Daniel Bleichenbacher recently described an attack on PKCS #1 v1.5 signatures. Where an RSA key with exponent 3 is used it may be possible for an attacker to forge a PKCS #1 v1.5 signature that would be incorrectly verified by implementations that do not check for excess data in the RSA exponentiation result of the signature. The Google Security Team discovered that OpenSSL is vulnerable to this attack. This issue affects applications that use OpenSSL to verify X.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339) This errata also resolves a problem where a customized ca-bundle.crt file was overwritten when the openssl package was upgraded.
    last seen2020-06-01
    modified2020-06-02
    plugin id67405
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/67405
    titleOracle Linux 4 : openssl (ELSA-2006-0695 / ELSA-2006-0661)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_121229.NASL
    descriptionSunOS 5.10: libssl patch. Date this patch was last updated by Sun : Apr/23/07
    last seen2018-09-01
    modified2018-08-13
    plugin id20272
    published2005-12-07
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=20272
    titleSolaris 10 (sparc) : 121229-02
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200612-11.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200612-11 (AMD64 x86 emulation base libraries: OpenSSL multiple vulnerabilities) Tavis Ormandy and Will Drewry, both of the Google Security Team, discovered that the SSL_get_shared_ciphers() function contains a buffer overflow vulnerability, and that the SSLv2 client code contains a flaw leading to a crash. Additionally, Dr. Stephen N. Henson found that the ASN.1 handler contains two Denial of Service vulnerabilities: while parsing an invalid ASN.1 structure and while handling certain types of public key. Impact : An attacker could trigger the buffer overflow by sending a malicious suite of ciphers to an application using the vulnerable function, and thus execute arbitrary code with the rights of the user running the application. An attacker could also consume CPU and/or memory by exploiting the Denial of Service vulnerabilities. Finally, a malicious server could crash a SSLv2 client through the SSLv2 vulnerability. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id23863
    published2006-12-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/23863
    titleGLSA-200612-11 : AMD64 x86 emulation base libraries: OpenSSL multiple vulnerabilities
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_0F37D765C5D411DB9F82000E0C2E438A.NASL
    descriptionSeveral problems have been found in OpenSSL : - During the parsing of certain invalid ASN1 structures an error condition is mishandled, possibly resulting in an infinite loop. - A buffer overflow exists in the SSL_get_shared_ciphers function. - A NULL pointer may be dereferenced in the SSL version 2 client code. In addition, many applications using OpenSSL do not perform any validation of the lengths of public keys being used. Impact : Servers which parse ASN1 data from untrusted sources may be vulnerable to a denial of service attack. An attacker accessing a server which uses SSL version 2 may be able to execute arbitrary code with the privileges of that server. A malicious SSL server can cause clients connecting using SSL version 2 to crash. Applications which perform public key operations using untrusted keys may be vulnerable to a denial of service attack. Workaround : No workaround is available, but not all of the vulnerabilities mentioned affect all applications.
    last seen2020-06-01
    modified2020-06-02
    plugin id24719
    published2007-02-27
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/24719
    titleFreeBSD : OpenSSL -- Multiple problems in crypto(3) (0f37d765-c5d4-11db-9f82-000e0c2e438a)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2006-172.NASL
    descriptionDr S N Henson of the OpenSSL core team and Open Network Security recently developed an ASN1 test suite for NISCC (www.niscc.gov.uk). When the test suite was run against OpenSSL two denial of service vulnerabilities were discovered. During the parsing of certain invalid ASN1 structures an error condition is mishandled. This can result in an infinite loop which consumes system memory. (CVE-2006-2937) Certain types of public key can take disproportionate amounts of time to process. This could be used by an attacker in a denial of service attack. (CVE-2006-2940) Tavis Ormandy and Will Drewry of the Google Security Team discovered a buffer overflow in the SSL_get_shared_ciphers utility function, used by some applications such as exim and mysql. An attacker could send a list of ciphers that would overrun a buffer. (CVE-2006-3738) Tavis Ormandy and Will Drewry of the Google Security Team discovered a possible DoS in the sslv2 client code. Where a client application uses OpenSSL to make a SSLv2 connection to a malicious server that server could cause the client to crash. (CVE-2006-4343) Updated packages are patched to address these issues. Update : There was an error in the original published patches for CVE-2006-2940. New packages have corrected this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id24558
    published2007-02-18
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24558
    titleMandrake Linux Security Advisory : openssl (MDKSA-2006:172-1)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2006-0695.NASL
    descriptionFrom Red Hat Security Advisory 2006:0695 : Updated OpenSSL packages are now available to correct several security issues. This update has been rated as having important security impact by the Red Hat Security Response Team. The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols. Tavis Ormandy and Will Drewry of the Google Security Team discovered a buffer overflow in the SSL_get_shared_ciphers() utility function. An attacker could send a list of ciphers to an application that used this function and overrun a buffer (CVE-2006-3738). Few applications make use of this vulnerable function and generally it is used only when applications are compiled for debugging. Tavis Ormandy and Will Drewry of the Google Security Team discovered a flaw in the SSLv2 client code. When a client application used OpenSSL to create an SSLv2 connection to a malicious server, that server could cause the client to crash. (CVE-2006-4343) Dr S. N. Henson of the OpenSSL core team and Open Network Security recently developed an ASN.1 test suite for NISCC (www.niscc.gov.uk) which uncovered denial of service vulnerabilities : * Certain public key types can take disproportionate amounts of time to process, leading to a denial of service. (CVE-2006-2940) * During parsing of certain invalid ASN.1 structures an error condition was mishandled. This can result in an infinite loop which consumed system memory (CVE-2006-2937). This issue does not affect the OpenSSL version distributed in Red Hat Enterprise Linux 2.1. These vulnerabilities can affect applications which use OpenSSL to parse ASN.1 data from untrusted sources, including SSL servers which enable client authentication and S/MIME applications. Users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. Note: After installing this update, users are advised to either restart all services that use OpenSSL or restart their system.
    last seen2020-06-01
    modified2020-06-02
    plugin id67411
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67411
    titleOracle Linux 3 : openssl (ELSA-2006-0695)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2008-0525.NASL
    descriptionRed Hat Network Satellite Server version 4.2.3 is now available. This update includes fixes for a number of security issues in Red Hat Network Satellite Server Solaris client components. This update has been rated as having moderate security impact by the Red Hat Security Response Team. This release corrects several security vulnerabilities in various components shipped as part of the Red Hat Network Satellite Server Solaris client. In a typical operating environment, these components are not used by the Satellite Server in a vulnerable manner. These security updates will reduce risk should these components be used by other applications. Several flaws in Zlib was discovered. An attacker could create a carefully-crafted compressed stream that would cause an application to crash if the stream is opened by a user. (CVE-2005-2096). An attacker could create a carefully crafted compressed stream that would cause an application to crash if the stream is opened by a user. (CVE-2005-1849) A buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers() utility function. An attacker could send a list of ciphers to an application that used this function and overrun a buffer (CVE-2006-3738). A flaw in the SSLv2 client code was discovered. If a client application used OpenSSL to create an SSLv2 connection to a malicious server, that server could cause the client to crash. (CVE-2006-4343) An attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA key with exponent 3 is used it may be possible for an attacker to forge a PKCS #1 v1.5 signature that would be incorrectly verified by implementations that do not check for excess data in the RSA exponentiation result of the signature. This issue affected applications that use OpenSSL to verify X.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339) OpenSSL contained a software work-around for a bug in SSL handling in Microsoft Internet Explorer version 3.0.2. It is enabled in most servers that use OpenSSL to provide support for SSL and TLS. This work-around could allow an attacker, acting as a
    last seen2020-06-01
    modified2020-06-02
    plugin id43838
    published2010-01-10
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43838
    titleRHEL 3 / 4 : Solaris client in Satellite Server (RHSA-2008:0525)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_OPENSSL-2140.NASL
    descriptionA buffer overflow condition within the SSL_get_shared_ciphers() function and a DoS condition known as
    last seen2020-06-01
    modified2020-06-02
    plugin id27368
    published2007-10-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/27368
    titleopenSUSE 10 Security Update : openssl (openssl-2140)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2006-0695.NASL
    descriptionUpdated OpenSSL packages are now available to correct several security issues. This update has been rated as having important security impact by the Red Hat Security Response Team. The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols. Tavis Ormandy and Will Drewry of the Google Security Team discovered a buffer overflow in the SSL_get_shared_ciphers() utility function. An attacker could send a list of ciphers to an application that used this function and overrun a buffer (CVE-2006-3738). Few applications make use of this vulnerable function and generally it is used only when applications are compiled for debugging. Tavis Ormandy and Will Drewry of the Google Security Team discovered a flaw in the SSLv2 client code. When a client application used OpenSSL to create an SSLv2 connection to a malicious server, that server could cause the client to crash. (CVE-2006-4343) Dr S. N. Henson of the OpenSSL core team and Open Network Security recently developed an ASN.1 test suite for NISCC (www.niscc.gov.uk) which uncovered denial of service vulnerabilities : * Certain public key types can take disproportionate amounts of time to process, leading to a denial of service. (CVE-2006-2940) * During parsing of certain invalid ASN.1 structures an error condition was mishandled. This can result in an infinite loop which consumed system memory (CVE-2006-2937). This issue does not affect the OpenSSL version distributed in Red Hat Enterprise Linux 2.1. These vulnerabilities can affect applications which use OpenSSL to parse ASN.1 data from untrusted sources, including SSL servers which enable client authentication and S/MIME applications. Users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. Note: After installing this update, users are advised to either restart all services that use OpenSSL or restart their system.
    last seen2020-06-01
    modified2020-06-02
    plugin id22484
    published2006-10-02
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/22484
    titleCentOS 3 / 4 : openssl (CESA-2006:0695)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_COMPAT-OPENSSL097G-2171.NASL
    descriptionA buffer overflow condition within the SSL_get_shared_ciphers() function and a DoS condition known as
    last seen2020-06-01
    modified2020-06-02
    plugin id27187
    published2007-10-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/27187
    titleopenSUSE 10 Security Update : compat-openssl097g (compat-openssl097g-2171)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1195.NASL
    descriptionMultiple vulnerabilities have been discovered in the OpenSSL cryptographic software package that could allow an attacker to launch a denial of service attack by exhausting system resources or crashing processes on a victim
    last seen2020-06-01
    modified2020-06-02
    plugin id22881
    published2006-10-20
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22881
    titleDebian DSA-1195-1 : openssl096 - denial of service (multiple)
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0033_OPENSSL.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has openssl packages installed that are affected by multiple vulnerabilities: - OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an error state mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected. (CVE-2017-3737) - There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository. (CVE-2017-3738) - There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen. (CVE-2017-3736) - OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition. (CVE-2006-2937) - OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) public exponent or (2) public modulus values in X.509 certificates that require extra time to process when using RSA signature verification. (CVE-2006-2940) - Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers. (CVE-2006-3738) - OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. (CVE-2006-4339) - The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference. (CVE-2006-4343) - The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys. (CVE-2007-3108) - Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors. (CVE-2007-4995) - Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible. (CVE-2007-5135) - Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information. (CVE-2008-0891) - OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses particular cipher suites, which triggers a NULL pointer dereference. (CVE-2008-1672) - The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of future epoch DTLS records that are buffered in a queue, aka DTLS record buffer limitation bug. (CVE-2009-1377) - Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka DTLS fragment handling memory leak. (CVE-2009-1378) - Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate. (CVE-2009-1379) - The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post- renegotiation context, related to a plaintext injection attack, aka the Project Mogul issue. (CVE-2009-3555) - Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678. (CVE-2009-4355) - The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors. (CVE-2010-0742) - RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors. NOTE: some of these details are obtained from third party information. (CVE-2010-1633) - Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi- threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap- based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography. (CVE-2010-3864) - OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier. (CVE-2010-4180) - ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka OCSP stapling vulnerability. (CVE-2011-0014) - crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past. (CVE-2011-3207) - OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108. (CVE-2012-0050) - The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. (CVE-2012-2110) - The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. (CVE-2013-4353) - The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client. (CVE-2013-6449) - The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c. (CVE-2013-6450) - An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) - A flaw was found in the way SSL 3.0 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. (CVE-2014-3566) - A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127201
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127201
    titleNewStart CGSL CORE 5.04 / MAIN 5.04 : openssl Multiple Vulnerabilities (NS-SA-2019-0033)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-522-1.NASL
    descriptionIt was discovered that OpenSSL did not correctly perform Montgomery multiplications. Local attackers might be able to reconstruct RSA private keys by examining another user
    last seen2020-06-01
    modified2020-06-02
    plugin id28127
    published2007-11-10
    reporterUbuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/28127
    titleUbuntu 6.06 LTS / 6.10 / 7.04 : openssl vulnerabilities (USN-522-1)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2006-178.NASL
    descriptionOpenssl recently had several vulnerabilities which were patched (CVE-2006-2937,2940,3738,4339, 4343). Some versions of ntp are built against a static copy of the SSL libraries. As a precaution an updated copy built against the new libraries in being made available.
    last seen2020-06-01
    modified2020-06-02
    plugin id24564
    published2007-02-18
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24564
    titleMandrake Linux Security Advisory : ntp (MDKSA-2006:178)
  • NASL familyWeb Servers
    NASL idOPENSSL_0_9_7L_0_9_8D.NASL
    descriptionAccording to its banner, the remote server is running a version of OpenSSL that is earlier than 0.9.7l or 0.9.8d. As such, it is affected by multiple vulnerabilities : - A remote attacker could trigger a denial of service, either via malformed ASN.1 structures or specially crafted public keys. (CVE-2006-2937, CVE-2006-3738) - A remote attacker could execute arbitrary code on the remote server by exploiting a buffer overflow in the SSL_get_shared_ciphers function. (CVE-2006-2940) - A remote attacker could crash a client by sending an invalid server Hello. (CVE-2006-4343)
    last seen2020-06-01
    modified2020-06-02
    plugin id17757
    published2012-01-04
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/17757
    titleOpenSSL < 0.9.7l / 0.9.8d Multiple Vulnerabilities
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1379.NASL
    descriptionAn off-by-one error has been identified in the SSL_get_shared_ciphers() routine in the libssl library from OpenSSL, an implementation of Secure Socket Layer cryptographic libraries and utilities. This error could allow an attacker to crash an application making use of OpenSSL
    last seen2020-06-01
    modified2020-06-02
    plugin id26209
    published2007-10-03
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/26209
    titleDebian DSA-1379-1 : openssl - off-by-one error/buffer overflow
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_121230.NASL
    descriptionSunOS 5.10_x86: libssl patch. Date this patch was last updated by Sun : Apr/23/07
    last seen2018-09-01
    modified2018-08-13
    plugin id20275
    published2005-12-07
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=20275
    titleSolaris 10 (x86) : 121230-02
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2006-177.NASL
    descriptionOpenssl recently had several vulnerabilities which were patched (CVE-2006-2937,2940,3738,4339, 4343). Some MySQL versions are built against a static copy of the SSL libraries. As a precaution an updated copy built against the new libraries in being made available.
    last seen2020-06-01
    modified2020-06-02
    plugin id24563
    published2007-02-18
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24563
    titleMandrake Linux Security Advisory : MySQL (MDKSA-2006:177)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2008-0629.NASL
    descriptionRed Hat Network Satellite Server version 5.1.1 is now available. This update includes fixes for a number of security issues in Red Hat Network Satellite Server Solaris client components. This update has been rated as having moderate security impact by the Red Hat Security Response Team. This release corrects several security vulnerabilities in components shipped as part of the Red Hat Network Satellite Server Solaris client. In a typical operating environment, these components are not used by the Satellite Server in a vulnerable manner. These security updates will reduce risk should these components be used by other applications. Several flaws in Zlib were discovered. An attacker could create a carefully-crafted compressed stream that would cause an application to crash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849) A buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers() utility function. An attacker could send a list of ciphers to an application that used this function and overrun a buffer (CVE-2006-3738). A flaw in the SSLv2 client code was discovered. If a client application used OpenSSL to create an SSLv2 connection to a malicious server, that server could cause the client to crash. (CVE-2006-4343) An attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA key with exponent 3 was used an attacker could, potentially, forge a PKCS #1 v1.5 signature that would be incorrectly verified by implementations that do not check for excess data in the RSA exponentiation result of the signature. This issue affected applications that use OpenSSL to verify X.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339) OpenSSL contained a software work-around for a bug in SSL handling in Microsoft Internet Explorer version 3.0.2. It is enabled in most servers that use OpenSSL to provide support for SSL and TLS. This work-around was vulnerable to a man-in-the-middle attack which allowed a remote user to force an SSL connection to use SSL 2.0, rather than a stronger protocol, such as SSL 3.0 or TLS 1.0. (CVE-2005-2969) During OpenSSL parsing of certain invalid ASN.1 structures, an error condition was mishandled. This could result in an infinite loop which consumed system memory (CVE-2006-2937). Certain public key types could take disproportionate amounts of time to process in OpenSSL, leading to a denial of service. (CVE-2006-2940) A flaw was discovered in the Python repr() function
    last seen2020-06-01
    modified2020-06-02
    plugin id43839
    published2010-01-10
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43839
    titleRHEL 4 : Solaris client in Satellite Server (RHSA-2008:0629)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_OPENSSL-2141.NASL
    descriptionA buffer overflow condition within the SSL_get_shared_ciphers() function and a DoS condition known as
    last seen2020-06-01
    modified2020-06-02
    plugin id29542
    published2007-12-13
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/29542
    titleSuSE 10 Security Update : OpenSSL (ZYPP Patch Number 2141)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS9_X86_114568.NASL
    descriptionSunOS 5.9_x86: pkg utilities Patch. Date this patch was last updated by Sun : Apr/05/11
    last seen2020-06-01
    modified2020-06-02
    plugin id13606
    published2004-07-12
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/13606
    titleSolaris 9 (x86) : 114568-29
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL6734.NASL
    descriptionThe remote BIG-IP device is missing a patch required by a security advisory.
    last seen2020-06-01
    modified2020-06-02
    plugin id78213
    published2014-10-10
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78213
    titleF5 Networks BIG-IP : Local OpenSSL vulnerabilities (SOL6734)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_121230-02.NASL
    descriptionSunOS 5.10_x86: libssl patch. Date this patch was last updated by Sun : Apr/23/07
    last seen2020-06-01
    modified2020-06-02
    plugin id107877
    published2018-03-12
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/107877
    titleSolaris 10 (x86) : 121230-02
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SA_2006_058.NASL
    descriptionThe remote host is missing the patch for the advisory SUSE-SA:2006:058 (openssl). Several security problems were found and fixed in the OpenSSL cryptographic library. CVE-2006-3738/VU#547300: A Google security audit found a buffer overflow condition within the SSL_get_shared_ciphers() function which has been fixed. CVE-2006-4343/VU#386964: The above Google security audit also found that the OpenSSL SSLv2 client code fails to properly check for NULL which could lead to a server program using openssl to crash. CVE-2006-2937: Fix mishandling of an error condition in parsing of certain invalid ASN1 structures, which could result in an infinite loop which consumes system memory. CVE-2006-2940: Certain types of public key can take disproportionate amounts of time to process. This could be used by an attacker in a denial of service attack to cause the remote side top spend an excessive amount of time in computation.
    last seen2019-10-28
    modified2007-02-18
    plugin id24436
    published2007-02-18
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24436
    titleSUSE-SA:2006:058: openssl
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2006-1004.NASL
    description - Thu Sep 28 2006 Tomas Mraz <tmraz at redhat.com> 0.9.8a-5.4 - fix CVE-2006-2937 - mishandled error on ASN.1 parsing (#207276) - fix CVE-2006-2940 - parasitic public keys DoS (#207274) - fix CVE-2006-3738 - buffer overflow in SSL_get_shared_ciphers (#206940) - fix CVE-2006-4343 - sslv2 client DoS (#206940) - Sat Sep 9 2006 Tomas Mraz <tmraz at redhat.com> 0.9.8a-5.3 - fix CVE-2006-4339 - prevent attack on PKCS#1 v1.5 signatures (#205180) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id24028
    published2007-01-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24028
    titleFedora Core 5 : openssl-0.9.8a-5.4 (2006-1004)

Oval

  • accepted2013-04-29T04:03:31.280-04:00
    classvulnerability
    contributors
    • nameAharon Chernin
      organizationSCAP.com, LLC
    • nameDragos Prisaca
      organizationG2, Inc.
    definition_extensions
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
      ovaloval:org.mitre.oval:def:11782
    • commentCentOS Linux 3.x
      ovaloval:org.mitre.oval:def:16651
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
      ovaloval:org.mitre.oval:def:11831
    • commentCentOS Linux 4.x
      ovaloval:org.mitre.oval:def:16636
    • commentOracle Linux 4.x
      ovaloval:org.mitre.oval:def:15990
    descriptionThe get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.
    familyunix
    idoval:org.mitre.oval:def:10207
    statusaccepted
    submitted2010-07-09T03:56:16-04:00
    titleThe get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.
    version26
  • accepted2008-01-14T04:00:06.896-05:00
    classvulnerability
    contributors
    nameTodd Dolinsky
    organizationHewlett-Packard
    definition_extensions
    • commentSolaris 10 (SPARC) is installed
      ovaloval:org.mitre.oval:def:1440
    • commentSolaris 10 (x86) is installed
      ovaloval:org.mitre.oval:def:1926
    descriptionThe get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.
    familyunix
    idoval:org.mitre.oval:def:4356
    statusaccepted
    submitted2007-12-04T09:53:52.000-05:00
    titleSecurity Vulnerabilities in OpenSSL May Lead to a Denial of Service (DoS) to Applications or Execution of Arbitrary Code With Elevated Privileges
    version34

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/62019/openssl-dos.txt
idPACKETSTORM:62019
last seen2016-12-05
published2007-12-24
reporterNoam Rathaus
sourcehttps://packetstormsecurity.com/files/62019/openssl-dos.txt.html
titleopenssl-dos.txt

Redhat

advisories
  • bugzilla
    id207276
    titleCVE-2006-2937 OpenSSL ASN1 DoS
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 4 is installed
        ovaloval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • commentopenssl-devel is earlier than 0:0.9.7a-43.14
            ovaloval:com.redhat.rhsa:tst:20060695001
          • commentopenssl-devel is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060661006
        • AND
          • commentopenssl-perl is earlier than 0:0.9.7a-43.14
            ovaloval:com.redhat.rhsa:tst:20060695003
          • commentopenssl-perl is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060661008
        • AND
          • commentopenssl is earlier than 0:0.9.7a-43.14
            ovaloval:com.redhat.rhsa:tst:20060695005
          • commentopenssl is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060661004
        • AND
          • commentopenssl096b is earlier than 0:0.9.6b-22.46
            ovaloval:com.redhat.rhsa:tst:20060695007
          • commentopenssl096b is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060661002
    rhsa
    idRHSA-2006:0695
    released2006-09-28
    severityImportant
    titleRHSA-2006:0695: openssl security update (Important)
  • rhsa
    idRHSA-2008:0629
rpms
  • openssl-0:0.9.6b-46
  • openssl-0:0.9.7a-33.21
  • openssl-0:0.9.7a-43.14
  • openssl-debuginfo-0:0.9.7a-33.21
  • openssl-debuginfo-0:0.9.7a-43.14
  • openssl-devel-0:0.9.6b-46
  • openssl-devel-0:0.9.7a-33.21
  • openssl-devel-0:0.9.7a-43.14
  • openssl-perl-0:0.9.6b-46
  • openssl-perl-0:0.9.7a-33.21
  • openssl-perl-0:0.9.7a-43.14
  • openssl095a-0:0.9.5a-32
  • openssl096-0:0.9.6-32
  • openssl096b-0:0.9.6b-16.46
  • openssl096b-0:0.9.6b-22.46
  • openssl096b-debuginfo-0:0.9.6b-16.46
  • openssl096b-debuginfo-0:0.9.6b-22.46
  • rhn-solaris-bootstrap-0:5.0.2-3
  • rhn_solaris_bootstrap_5_0_2_3-0:1-0
  • rhn-solaris-bootstrap-0:5.0.2-3
  • rhn_solaris_bootstrap_5_0_2_3-0:1-0
  • rhn-solaris-bootstrap-0:5.1.1-3
  • rhn_solaris_bootstrap_5_1_1_3-0:1-0

Seebug

  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:65057
    last seen2017-11-19
    modified2014-07-01
    published2014-07-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-65057
    titleOpenSSL < 0.9.7l / 0.9.8d - SSLv2 Client Crash Exploit
  • bulletinFamilyexploit
    descriptionApple Mac OS X是一款基于BSD的操作系统。 Apple Mac OS X存在多个安全问题,远程和本地攻击者可以利用漏洞进行恶意代码执行,拒绝服务攻击,特权提升,覆盖文件,获得敏感信息等攻击。 具体问题如下: AirPort-CVE-ID: CVE-2006-5710: AirPort无线驱动不正确处理应答帧,可导致基于堆的溢出。 ATS-CVE-ID: CVE-2006-4396: Apple Type服务不安全建立错误日至可导致任意文件覆盖。 ATS-CVE-ID: CVE-2006-4398: Apple Type服务存在多个缓冲区溢出,可导致以高权限执行任意代码。 ATS-CVE-ID: CVE-2006-4400: 利用特殊的字体文件,可导致任意代码执行。 CFNetwork-CVE-ID: CVE-2006-4401: 通过诱使用户访问恶意ftp URI,可导致任意ftp命令执行。 ClamAV-CVE-ID: CVE-2006-4182: 恶意email消息可导致ClamAV执行任意代码。 Finder-CVE-ID: CVE-2006-4402: 通过浏览共享目录可导致应用程序崩溃或执行任意代码。 ftpd-CVE-ID: CVE-2006-4403: 当ftp访问启用时,未授权用户可判别合法的账户名。 gnuzip-CVE-ID: CVE-2006-4334, CVE-2006-4335, CVE-2006-4336, CVE-2006-4337, CVE-2006-4338: gunzip处理压缩文件存在多个问题,可导致应用程序崩溃或执行任意指令。 Installer-CVE-ID: CVE-2006-4404: 当以管理用户安装软件时,系统权限可能被未授权利用。 OpenSSL-CVE-ID: CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4339, CVE-2006-4343: OpenSSL存在多个安全问题可导致任意代码执行或者获得敏感信息。 perl-CVE-ID: CVE-2005-3962: 不安全处理字符串,可导致Perl应用程序执行任意代码。 PHP-CVE-ID: CVE-2006-1490, CVE-2006-1990: Php应用程序存在多个问题,可导致拒绝服务或执行任意代码。 PHP-CVE-ID: CVE-2006-5465: PHP的htmlentities()和htmlspecialchars()函数存在缓冲区溢出,可导致任意代码执行。 PPP-CVE-ID: CVE-2006-4406: 在不可信的本地网络上使用PPPoE可导致任意代码执行。 Samba-CVE-ID: CVE-2006-3403: 当Windows共享使用时,远程攻击者可进行拒绝服务攻击。 Security Framework-CVE-ID: CVE-2006-4407: 不安全的传送方法可导致不协商最安全的加密信息。 Security Framework-CVE-ID: CVE-2006-4408: 处理X.509证书时可导致拒绝服务攻击。 Security Framework-CVE-ID: CVE-2006-4409: 当使用http代理时,证书废弃列表不能获得。 Security Framework-CVE-ID: CVE-2006-4410: 部分调用证书错误的被授权。 VPN-CVE-ID: CVE-2006-4411: 恶意本地用户可获得系统特权。 WebKit-CVE-ID: CVE-2006-4412: 通过诱使用户浏览恶意web页执行任意代码。 Apple Mac OS X Server 10.4.8 Apple Mac OS X Server 10.4.7 Apple Mac OS X Server 10.4.6 Apple Mac OS X Server 10.4.5 Apple Mac OS X Server 10.4.4 Apple Mac OS X Server 10.4.3 Apple Mac OS X Server 10.4.2 Apple Mac OS X Server 10.4.1 Apple Mac OS X Server 10.4 Apple Mac OS X Server 10.3.9 Apple Mac OS X Server 10.3.8 Apple Mac OS X Server 10.3.7 Apple Mac OS X Server 10.3.6 Apple Mac OS X Server 10.3.5 Apple Mac OS X Server 10.3.4 Apple Mac OS X Server 10.3.3 Apple Mac OS X Server 10.3.2 Apple Mac OS X Server 10.3.1 Apple Mac OS X Server 10.3 Apple Mac OS X Server 10.2.8 Apple Mac OS X Server 10.2.7 Apple Mac OS X Server 10.2.6 Apple Mac OS X Server 10.2.5 Apple Mac OS X Server 10.2.4 Apple Mac OS X Server 10.2.3 Apple Mac OS X Server 10.2.2 Apple Mac OS X Server 10.2.1 Apple Mac OS X Server 10.2 Apple Mac OS X Server 10.1.5 Apple Mac OS X Server 10.1.4 Apple Mac OS X Server 10.1.3 Apple Mac OS X Server 10.1.2 Apple Mac OS X Server 10.1.1 Apple Mac OS X Server 10.1 Apple Mac OS X Server 10.0 Apple Mac OS X 10.4.8 Apple Mac OS X 10.4.7 Apple Mac OS X 10.4.6 Apple Mac OS X 10.4.5 Apple Mac OS X 10.4.4 Apple Mac OS X 10.4.3 Apple Mac OS X 10.4.2 Apple Mac OS X 10.4.1 Apple Mac OS X 10.4 Apple Mac OS X 10.3.9 Apple Mac OS X 10.3.8 Apple Mac OS X 10.3.7 Apple Mac OS X 10.3.6 Apple Mac OS X 10.3.5 Apple Mac OS X 10.3.4 Apple Mac OS X 10.3.3 Apple Mac OS X 10.3.2 Apple Mac OS X 10.3.1 Apple Mac OS X 10.3 Apple Mac OS X 10.2.8 Apple Mac OS X 10.2.7 Apple Mac OS X 10.2.6 Apple Mac OS X 10.2.5 Apple Mac OS X 10.2.4 Apple Mac OS X 10.2.3 Apple Mac OS X 10.2.2 Apple Mac OS X 10.2.1 Apple Mac OS X 10.2 Apple Mac OS X 10.1.5 Apple Mac OS X 10.1.4 Apple Mac OS X 10.1.3 Apple Mac OS X 10.1.2 Apple Mac OS X 10.1.1 Apple Mac OS X 10.1 Apple Mac OS X 10.1 Apple Mac OS X 10.0.4 Apple Mac OS X 10.0.3 Apple Mac OS X 10.0.2 Apple Mac OS X 10.0.1 Apple Mac OS X 10.0 3 Apple Mac OS X 10.0 <a href="http://docs.info.apple.com/article.html?artnum=304829" target="_blank">http://docs.info.apple.com/article.html?artnum=304829</a>
    idSSV:623
    last seen2017-11-19
    modified2006-11-29
    published2006-11-29
    reporterRoot
    titleApple Mac OS X 2006-007存在多个安全漏洞
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:82273
    last seen2017-11-19
    modified2014-07-01
    published2014-07-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-82273
    titleOpenSSL SSLv2 - Null Pointer Dereference Client Denial of Service Vulnerability
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:7704
    last seen2017-11-19
    modified2007-12-24
    published2007-12-24
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-7704
    titleOpenSSL &lt; 0.9.7l / 0.9.8d SSLv2 Client Crash Exploit

Statements

contributorMark J Cox
lastmodified2007-03-14
organizationRed Hat
statementRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References