Vulnerabilities > CVE-2008-5077 - Improper Input Validation vulnerability in Openssl
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Buffer Overflow via Environment Variables This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
- Server Side Include (SSI) Injection An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
- Cross Zone Scripting An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security. In a zone-based model, pages belong to one of a set of zones corresponding to the level of privilege assigned to that page. Pages in an untrusted zone would have a lesser level of access to the system and/or be restricted in the types of executable content it was allowed to invoke. In a cross-zone scripting attack, a page that should be assigned to a less privileged zone is granted the privileges of a more trusted zone. This can be accomplished by exploiting bugs in the browser, exploiting incorrect configuration in the zone controls, through a cross-site scripting attack that causes the attackers' content to be treated as coming from a more trusted page, or by leveraging some piece of system functionality that is accessible from both the trusted and less trusted zone. This attack differs from "Restful Privilege Escalation" in that the latter correlates to the inadequate securing of RESTful access methods (such as HTTP DELETE) on the server, while cross-zone scripting attacks the concept of security zones as implemented by a browser.
- Cross Site Scripting through Log Files An attacker may leverage a system weakness where logs are susceptible to log injection to insert scripts into the system's logs. If these logs are later viewed by an administrator through a thin administrative interface and the log data is not properly HTML encoded before being written to the page, the attackers' scripts stored in the log will be executed in the administrative interface with potentially serious consequences. This attack pattern is really a combination of two other attack patterns: log injection and stored cross site scripting.
- Command Line Execution through SQL Injection An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.
Nessus
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2009-037.NASL description Internet Systems Consortium (ISC) BIND 9.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077 and CVE-2009-0025. In this particular case the DSA_verify function was fixed with MDVSA-2009:002, this update does however address the RSA_verify function (CVE-2009-0265). last seen 2020-06-01 modified 2020-06-02 plugin id 36346 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/36346 title Mandriva Linux Security Advisory : bind (MDVSA-2009:037) NASL family SuSE Local Security Checks NASL id SUSE_11_4_COMPAT-OPENSSL097G-110721.NASL description This update adds openssl patches since 2007 for : - CVE-2008-5077 - CVE-2009-0590 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180 last seen 2020-06-01 modified 2020-06-02 plugin id 75802 published 2014-06-13 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/75802 title openSUSE Security Update : compat-openssl097g (openSUSE-SU-2011:0845-1) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2009-014-03.NASL description New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, and -current to a fix security issue. last seen 2020-06-01 modified 2020-06-02 plugin id 35377 published 2009-01-15 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35377 title Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 8.1 / 9.0 / 9.1 / current : ntp (SSA:2009-014-03) NASL family SuSE Local Security Checks NASL id SUSE_11_0_COMPAT-OPENSSL097G-090127.NASL description This update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077) last seen 2020-06-01 modified 2020-06-02 plugin id 39937 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/39937 title openSUSE Security Update : compat-openssl097g (compat-openssl097g-480) NASL family NewStart CGSL Local Security Checks NASL id NEWSTART_CGSL_NS-SA-2019-0020_OPENSSL098E.NASL description The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has openssl098e packages installed that are affected by multiple vulnerabilities: - OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition. (CVE-2006-2937) - OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) public exponent or (2) public modulus values in X.509 certificates that require extra time to process when using RSA signature verification. (CVE-2006-2940) - Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers. (CVE-2006-3738) - OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. (CVE-2006-4339) - The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference. (CVE-2006-4343) - The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys. (CVE-2007-3108) - Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors. (CVE-2007-4995) - Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible. (CVE-2007-5135) - OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys. (CVE-2008-5077) - The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length. (CVE-2009-0590) - The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of future epoch DTLS records that are buffered in a queue, aka DTLS record buffer limitation bug. (CVE-2009-1377) - Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka DTLS fragment handling memory leak. (CVE-2009-1378) - Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate. (CVE-2009-1379) - ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello. (CVE-2009-1386) - The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of- sequence DTLS handshake message, related to a fragment bug. (CVE-2009-1387) - The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large. (CVE-2009-2409) - OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors. (CVE-2009-3245) - The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post- renegotiation context, related to a plaintext injection attack, aka the Project Mogul issue. (CVE-2009-3555) - Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678. (CVE-2009-4355) - The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot. (CVE-2010-0433) - The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. (CVE-2012-2110) - The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the- middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a CRIME attack. (CVE-2012-4929) - OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key. (CVE-2013-0166) - The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side- channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the Lucky Thirteen issue. (CVE-2013-0169) Note that Nessus has not tested for this issue but has instead relied only on the application last seen 2020-06-01 modified 2020-06-02 plugin id 127177 published 2019-08-12 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/127177 title NewStart CGSL CORE 5.04 / MAIN 5.04 : openssl098e Multiple Vulnerabilities (NS-SA-2019-0020) NASL family VMware ESX Local Security Checks NASL id VMWARE_VMSA-2009-0004.NASL description a. Updated OpenSSL package for the Service Console fixes a security issue. OpenSSL 0.9.7a-33.24 and earlier does not properly check the return value from the EVP_VerifyFinal function, which could allow a remote attacker to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2008-5077 to this issue. b. Update bind package for the Service Console fixes a security issue. A flaw was discovered in the way Berkeley Internet Name Domain (BIND) checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2009-0025 to this issue. c. Updated vim package for the Service Console addresses several security issues. Several input flaws were found in Visual editor IMproved last seen 2020-06-01 modified 2020-06-02 plugin id 40389 published 2009-07-27 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40389 title VMSA-2009-0004 : ESX Service Console updates for openssl, bind, and vim NASL family SuSE Local Security Checks NASL id SUSE_COMPAT-OPENSSL097G-7645.NASL description This update adds openssl patches since 2007 for : - CVE-2009-0590 - CVE-2008-5077 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180 last seen 2020-06-01 modified 2020-06-02 plugin id 57170 published 2011-12-13 reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/57170 title SuSE 10 Security Update : compat-openssl097g (ZYPP Patch Number 7645) NASL family SuSE Local Security Checks NASL id SUSE_COMPAT-OPENSSL097G-5957.NASL description This update improves the verification of return values. Prior to this update it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077) last seen 2020-06-01 modified 2020-06-02 plugin id 41490 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41490 title SuSE 10 Security Update : compat-openssl097g (ZYPP Patch Number 5957) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2009-014-02.NASL description New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, and -current to fix a security issue. last seen 2020-06-01 modified 2020-06-02 plugin id 54870 published 2011-05-28 reporter This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/54870 title Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 8.1 / 9.0 / 9.1 / current : bind (SSA:2009-014-02) NASL family CGI abuses NASL id HPSMH_3_0_1_73.NASL description According to its self-reported version number, the HP System Management Homepage install on the remote host is earlier than 3.0.1.73. Such versions are reportedly affected by multiple flaws : - A weakness in PHP could be exploited to perform cross- site scripting attacks, provided PHP directive last seen 2020-06-01 modified 2020-06-02 plugin id 38832 published 2009-05-20 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/38832 title HP System Management Homepage < 3.0.1.73 Multiple Flaws NASL family SuSE Local Security Checks NASL id SUSE_LIBOPENSSL-DEVEL-5951.NASL description This update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077) last seen 2020-06-01 modified 2020-06-02 plugin id 35459 published 2009-01-26 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35459 title openSUSE 10 Security Update : libopenssl-devel (libopenssl-devel-5951) NASL family F5 Networks Local Security Checks NASL id F5_BIGIP_SOL11503.NASL description The remote BIG-IP device is missing a patch required by a security advisory. last seen 2020-06-01 modified 2020-06-02 plugin id 78125 published 2014-10-10 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/78125 title F5 Networks BIG-IP : BIND 9 vulnerability (SOL11503) NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_139501-02.NASL description SunOS 5.10_x86: openssl patch. Date this patch was last updated by Sun : Feb/24/09 last seen 2020-06-01 modified 2020-06-02 plugin id 108014 published 2018-03-12 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/108014 title Solaris 10 (x86) : 139501-02 NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2009-0004.NASL description Updated OpenSSL packages that correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength, general purpose, cryptography library. The Google security team discovered a flaw in the way OpenSSL checked the verification of certificates. An attacker in control of a malicious server, or able to effect a last seen 2020-06-01 modified 2020-06-02 plugin id 35310 published 2009-01-08 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35310 title CentOS 3 / 4 / 5 : openssl (CESA-2009:0004) NASL family Fedora Local Security Checks NASL id FEDORA_2009-0544.NASL description This update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 36222 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/36222 title Fedora 10 : ntp-4.2.4p6-1.fc10 (2009-0544) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-704-1.NASL description It was discovered that OpenSSL did not properly perform signature verification on DSA and ECDSA keys. If user or automated system connected to a malicious server or a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to view sensitive information. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 36382 published 2009-04-23 reporter Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/36382 title Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : openssl vulnerability (USN-704-1) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2009-0020.NASL description From Red Hat Security Advisory 2009:0020 : Updated Bind packages to correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. A flaw was discovered in the way BIND checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. (CVE-2009-0025) For users of Red Hat Enterprise Linux 3 this update also addresses a bug which can cause BIND to occasionally exit with an assertion failure. All BIND users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. After installing the update, BIND daemon will be restarted automatically. last seen 2020-06-01 modified 2020-06-02 plugin id 67792 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67792 title Oracle Linux 3 / 4 / 5 : bind (ELSA-2009-0020) NASL family Web Servers NASL id OPENSSL_0_9_8J.NASL description According to its banner, the remote server is running a version of OpenSSL that is earlier than 0.9.8j. A remote attacker could implement a man-in-the-middle attack by forging an SSL/TLS signature using DSA and ECDSA keys which bypass validation of the certificate chain. last seen 2020-06-01 modified 2020-06-02 plugin id 17762 published 2012-01-04 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/17762 title OpenSSL < 0.9.8j Signature Spoofing NASL family Fedora Local Security Checks NASL id FEDORA_2009-0547.NASL description This update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 35455 published 2009-01-26 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35455 title Fedora 9 : ntp-4.2.4p6-1.fc9 (2009-0547) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200904-05.NASL description The remote host is affected by the vulnerability described in GLSA-200904-05 (ntp: Certificate validation error) It has been reported that ntp incorrectly checks the return value of the EVP_VerifyFinal(), a vulnerability related to CVE-2008-5077 (GLSA 200902-02). Impact : A remote attacker could exploit this vulnerability to spoof arbitrary names to conduct Man-In-The-Middle attacks and intercept sensitive information. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 36093 published 2009-04-07 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/36093 title GLSA-200904-05 : ntp: Certificate validation error NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2009-0020.NASL description Updated Bind packages to correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. A flaw was discovered in the way BIND checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. (CVE-2009-0025) For users of Red Hat Enterprise Linux 3 this update also addresses a bug which can cause BIND to occasionally exit with an assertion failure. All BIND users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. After installing the update, BIND daemon will be restarted automatically. last seen 2020-06-01 modified 2020-06-02 plugin id 35589 published 2009-02-05 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35589 title CentOS 3 / 4 / 5 : bind (CESA-2009:0020) NASL family SuSE Local Security Checks NASL id SUSE_OPENSSL-5949.NASL description This update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077) last seen 2020-06-01 modified 2020-06-02 plugin id 41570 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41570 title SuSE 10 Security Update : openssl (ZYPP Patch Number 5949) NASL family Fedora Local Security Checks NASL id FEDORA_2009-0331.NASL description Only one important security fix and one trivial enhancement/bug fix. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 36344 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/36344 title Fedora 10 : openssl-0.9.8g-12.fc10 (2009-0331) NASL family SuSE Local Security Checks NASL id SUSE_COMPAT-OPENSSL097G-5964.NASL description This update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077) last seen 2020-06-01 modified 2020-06-02 plugin id 35471 published 2009-01-28 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35471 title openSUSE 10 Security Update : compat-openssl097g (compat-openssl097g-5964) NASL family SuSE Local Security Checks NASL id SUSE_11_COMPAT-OPENSSL097G-110721.NASL description This update adds openssl patches since 2007 for : - CVE-2009-0590 - CVE-2008-5077 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180 last seen 2020-06-01 modified 2020-06-02 plugin id 55711 published 2011-07-28 reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/55711 title SuSE 11.1 Security Update : compat-openssl097g (SAT Patch Number 4913) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2009-0004.NASL description From Red Hat Security Advisory 2009:0004 : Updated OpenSSL packages that correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength, general purpose, cryptography library. The Google security team discovered a flaw in the way OpenSSL checked the verification of certificates. An attacker in control of a malicious server, or able to effect a last seen 2020-06-01 modified 2020-06-02 plugin id 67783 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67783 title Oracle Linux 3 / 4 / 5 : openssl (ELSA-2009-0004) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2009-0004.NASL description Updated OpenSSL packages that correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength, general purpose, cryptography library. The Google security team discovered a flaw in the way OpenSSL checked the verification of certificates. An attacker in control of a malicious server, or able to effect a last seen 2020-06-01 modified 2020-06-02 plugin id 35316 published 2009-01-08 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35316 title RHEL 2.1 / 3 / 4 / 5 : openssl (RHSA-2009:0004) NASL family Solaris Local Security Checks NASL id SOLARIS10_139500.NASL description SunOS 5.10: openssl patch. Date this patch was last updated by Sun : Apr/01/09 last seen 2018-09-01 modified 2018-08-13 plugin id 38118 published 2009-04-23 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=38118 title Solaris 10 (sparc) : 139500-04 NASL family SuSE Local Security Checks NASL id SUSE_COMPAT-OPENSSL097G-7644.NASL description This update adds openssl patches since 2007 for : - CVE-2009-0590 - CVE-2008-5077 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180 last seen 2020-06-01 modified 2020-06-02 plugin id 55715 published 2011-07-28 reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/55715 title SuSE 10 Security Update : compat-openssl097g (ZYPP Patch Number 7644) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-705-1.NASL description It was discovered that NTP did not properly perform signature verification. A remote attacker could exploit this to bypass certificate validation via a malformed SSL/TLS signature. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 37876 published 2009-04-23 reporter Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/37876 title Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : ntp vulnerability (USN-705-1) NASL family SuSE Local Security Checks NASL id SUSE_11_1_COMPAT-OPENSSL097G-090204.NASL description This update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077) last seen 2020-06-01 modified 2020-06-02 plugin id 40203 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40203 title openSUSE Security Update : compat-openssl097g (compat-openssl097g-480) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2009-014-01.NASL description New openssl packages are available for Slackware 11.0, 12.0, 12.1, 12.2, and -current to fix a security issue when connecting to an SSL/TLS server that uses a certificate containing a DSA or ECDSA key. last seen 2020-06-01 modified 2020-06-02 plugin id 35376 published 2009-01-15 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35376 title Slackware 11.0 / 12.0 / 12.1 / 12.2 / current : openssl (SSA:2009-014-01) NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2009-001.NASL description A vulnerability was found by the Google Security Team with how OpenSSL checked the verification of certificates. An attacker in control of a malicious server or able to effect a man-in-the-middle attack, could present a malformed SSL/TLS signature from a certificate chain to a vulnerable client, which would then bypass the certificate validation (CVE-2008-5077). The updated packages have been patched to prevent this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 37839 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/37839 title Mandriva Linux Security Advisory : openssl (MDVSA-2009:001) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2009-0046.NASL description Updated ntp packages to correct a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer last seen 2020-06-01 modified 2020-06-02 plugin id 43728 published 2010-01-06 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/43728 title CentOS 4 / 5 : ntp (CESA-2009:0046) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-1547.NASL description According to the versions of the openssl packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - A NULL pointer dereference flaw was found in OpenSSL last seen 2020-06-01 modified 2020-06-02 plugin id 125000 published 2019-05-14 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/125000 title EulerOS Virtualization 3.0.1.0 : openssl (EulerOS-SA-2019-1547) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2009-0046.NASL description From Red Hat Security Advisory 2009:0046 : Updated ntp packages to correct a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer last seen 2020-06-01 modified 2020-06-02 plugin id 67793 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67793 title Oracle Linux 4 / 5 : ntp (ELSA-2009-0046) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1702.NASL description It has been discovered that NTP, an implementation of the Network Time Protocol, does not properly check the result of an OpenSSL function for verifying cryptographic signatures, which may ultimately lead to the acceptance of unauthenticated time information. (Note that cryptographic authentication of time servers is often not enabled in the first place.) last seen 2020-06-01 modified 2020-06-02 plugin id 35365 published 2009-01-14 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35365 title Debian DSA-1702-1 : ntp - interpretation conflict NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-706-1.NASL description It was discovered that Bind did not properly perform signature verification. When DNSSEC with DSA signatures are in use, a remote attacker could exploit this to bypass signature validation to spoof DNS entries and poison DNS caches. Among other things, this could lead to misdirected email and web traffic. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 36220 published 2009-04-23 reporter Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/36220 title Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : bind9 vulnerability (USN-706-1) NASL family SuSE Local Security Checks NASL id SUSE_11_0_LIBOPENSSL-DEVEL-090121.NASL description This update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077) last seen 2020-06-01 modified 2020-06-02 plugin id 40032 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40032 title openSUSE Security Update : libopenssl-devel (libopenssl-devel-461) NASL family SuSE Local Security Checks NASL id SUSE9_12341.NASL description This update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077) last seen 2020-06-01 modified 2020-06-02 plugin id 41271 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41271 title SuSE9 Security Update : openssl (YOU Patch Number 12341) NASL family OracleVM Local Security Checks NASL id ORACLEVM_OVMSA-2009-0011.NASL description The remote OracleVM system is missing necessary patches to address critical security updates : CVE-2009-0159 Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response. CVE-2009-1252 Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field. CVE-2009-0021 NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077. - fix buffer overflow when parsing Autokey association message (#500783, CVE-2009-1252) - fix buffer overflow in ntpq (#500783, CVE-2009-0159) - fix check for malformed signatures (#479698, CVE-2009-0021) - fix selecting multicast interface (#444106) - disable kernel discipline when -x option is used (#431729) - avoid use of uninitialized floating-point values in clock_select (#250838) - generate man pages from html source, include config man pages (#307271) - add note about paths and exit codes to ntpd man page (#242925, #246568) - add section about exit codes to ntpd man page (#319591) - always return 0 in scriptlets - pass additional options to ntpdate (#240141) - fix broadcast client to accept broadcasts on 255.255.255.255 (#226958) - compile with crypto support on 64bit architectures (#239580) - add ncurses-devel to buildrequires (#239580) - exit with nonzero code if ntpd -q did not set clock (#240134) - fix return codes in init script (#240118) last seen 2020-06-01 modified 2020-06-02 plugin id 79458 published 2014-11-26 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/79458 title OracleVM 2.1 : ntp (OVMSA-2009-0011) NASL family MacOS X Local Security Checks NASL id MACOSX_10_5_7.NASL description The remote host is running a version of Mac OS X 10.5.x that is prior to 10.5.7. Mac OS X 10.5.7 contains security fixes for the following products : - Apache - ATS - BIND - CFNetwork - CoreGraphics - Cscope - CUPS - Disk Images - enscript - Flash Player plug-in - Help Viewer - iChat - International Components for Unicode - IPSec - Kerberos - Kernel - Launch Services - libxml - Net-SNMP - Network Time - Networking - OpenSSL - PHP - QuickDraw Manager - ruby - Safari - Spotlight - system_cmds - telnet - Terminal - WebKit - X11 last seen 2020-06-01 modified 2020-06-02 plugin id 38744 published 2009-05-13 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/38744 title Mac OS X 10.5.x < 10.5.7 Multiple Vulnerabilities NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2009-0020.NASL description Updated Bind packages to correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. A flaw was discovered in the way BIND checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. (CVE-2009-0025) For users of Red Hat Enterprise Linux 3 this update also addresses a bug which can cause BIND to occasionally exit with an assertion failure. All BIND users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. After installing the update, BIND daemon will be restarted automatically. last seen 2020-06-01 modified 2020-06-02 plugin id 35324 published 2009-01-09 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35324 title RHEL 2.1 / 3 / 4 / 5 : bind (RHSA-2009:0020) NASL family SuSE Local Security Checks NASL id SUSE_11_3_COMPAT-OPENSSL097G-110721.NASL description This update adds openssl patches since 2007 for : - CVE-2008-5077 - CVE-2009-0590 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180 last seen 2020-06-01 modified 2020-06-02 plugin id 75453 published 2014-06-13 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/75453 title openSUSE Security Update : compat-openssl097g (openSUSE-SU-2011:0845-1) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2009-0046.NASL description Updated ntp packages to correct a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer last seen 2020-06-01 modified 2020-06-02 plugin id 35551 published 2009-01-29 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35551 title RHEL 4 / 5 : ntp (RHSA-2009:0046) NASL family Scientific Linux Local Security Checks NASL id SL_20090107_OPENSSL_ON_SL3_X.NASL description The Google security team discovered a flaw in the way OpenSSL checked the verification of certificates. An attacker in control of a malicious server, or able to effect a last seen 2020-06-01 modified 2020-06-02 plugin id 60513 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60513 title Scientific Linux Security Update : openssl on SL3.x, SL4.x, SL5.x i386/x86_64 NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_139501.NASL description SunOS 5.10_x86: openssl patch. Date this patch was last updated by Sun : Feb/24/09 last seen 2018-09-02 modified 2018-08-13 plugin id 36555 published 2009-04-23 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=36555 title Solaris 10 (x86) : 139501-02 NASL family Fedora Local Security Checks NASL id FEDORA_2009-0325.NASL description Only one important security fix and two very simple bugfixes. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 35397 published 2009-01-16 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35397 title Fedora 9 : openssl-0.9.8g-9.12.fc9 (2009-0325) NASL family Misc. NASL id VMWARE_VMSA-2009-0004_REMOTE.NASL description The remote VMware ESX host is missing a security-related patch. It is, therefore, is affected by multiple vulnerabilities : - A format string flaw exists in the Vim help tag processor in the helptags_one() function that allows a remote attacker to execute arbitrary code by tricking a user into executing the last seen 2020-06-01 modified 2020-06-02 plugin id 89112 published 2016-03-03 reporter This script is Copyright (C) 2016-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/89112 title VMware ESX Multiple Vulnerabilities (VMSA-2009-0004) (remote check) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200902-02.NASL description The remote host is affected by the vulnerability described in GLSA-200902-02 (OpenSSL: Certificate validation error) The Google Security Team reported that several functions incorrectly check the result after calling the EVP_VerifyFinal() function, allowing a malformed signature to be treated as a good signature rather than as an error. This issue affects the signature checks on DSA and ECDSA keys used with SSL/TLS. Impact : A remote attacker could exploit this vulnerability and spoof arbitrary names to conduct Man-In-The-Middle attacks and intercept sensitive information. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 35673 published 2009-02-13 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35673 title GLSA-200902-02 : OpenSSL: Certificate validation error NASL family F5 Networks Local Security Checks NASL id F5_BIGIP_SOL9754.NASL description The remote BIG-IP device is missing a patch required by a security advisory. last seen 2020-06-01 modified 2020-06-02 plugin id 78228 published 2014-10-10 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/78228 title F5 Networks BIG-IP : BIND 9 vulnerability (SOL9754) NASL family MacOS X Local Security Checks NASL id MACOSX_SECUPD2009-002.NASL description The remote host is running a version of Mac OS X 10.4 that does not have Security Update 2009-002 applied. This security update contains fixes for the following products : - Apache - ATS - BIND - CoreGraphics - Cscope - CUPS - Disk Images - enscript - Flash Player plug-in - Help Viewer - IPSec - Kerberos - Launch Services - libxml - Net-SNMP - Network Time - OpenSSL - QuickDraw Manager - Spotlight - system_cmds - telnet - Terminal - X11 last seen 2020-06-01 modified 2020-06-02 plugin id 38743 published 2009-05-13 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/38743 title Mac OS X Multiple Vulnerabilities (Security Update 2009-002) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1701.NASL description It was discovered that OpenSSL does not properly verify DSA signatures on X.509 certificates due to an API misuse, potentially leading to the acceptance of incorrect X.509 certificates as genuine (CVE-2008-5077 ). last seen 2020-06-01 modified 2020-06-02 plugin id 35364 published 2009-01-14 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35364 title Debian DSA-1701-1 : openssl, openssl097 - interpretation conflict NASL family SuSE Local Security Checks NASL id SUSE_11_1_LIBOPENSSL-DEVEL-090121.NASL description This update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077) last seen 2020-06-01 modified 2020-06-02 plugin id 40259 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40259 title openSUSE Security Update : libopenssl-devel (libopenssl-devel-461)
Oval
accepted 2009-11-30T04:00:36.828-05:00 class vulnerability contributors name Michael Wood organization Hewlett-Packard name Michael Wood organization Hewlett-Packard
definition_extensions comment VMWare ESX Server 3.0.3 is installed oval oval:org.mitre.oval:def:6026 comment VMWare ESX Server 3.0.2 is installed oval oval:org.mitre.oval:def:5613 comment VMware ESX Server 3.5.0 is installed oval oval:org.mitre.oval:def:5887
description OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys. family unix id oval:org.mitre.oval:def:6380 status accepted submitted 2009-09-23T15:39:02.000-04:00 title OpenSSL DSA and ECDSA "EVP_VerifyFinal()" Spoofing Vulnerability version 3 accepted 2013-04-29T04:18:21.379-04:00 class vulnerability contributors name Aharon Chernin organization SCAP.com, LLC name Dragos Prisaca organization G2, Inc.
definition_extensions comment The operating system installed on the system is Red Hat Enterprise Linux 3 oval oval:org.mitre.oval:def:11782 comment CentOS Linux 3.x oval oval:org.mitre.oval:def:16651 comment The operating system installed on the system is Red Hat Enterprise Linux 4 oval oval:org.mitre.oval:def:11831 comment CentOS Linux 4.x oval oval:org.mitre.oval:def:16636 comment Oracle Linux 4.x oval oval:org.mitre.oval:def:15990 comment The operating system installed on the system is Red Hat Enterprise Linux 5 oval oval:org.mitre.oval:def:11414 comment The operating system installed on the system is CentOS Linux 5.x oval oval:org.mitre.oval:def:15802 comment Oracle Linux 5.x oval oval:org.mitre.oval:def:15459
description OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys. family unix id oval:org.mitre.oval:def:9155 status accepted submitted 2010-07-09T03:56:16-04:00 title OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys. version 28
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 33150 CVE ID:CVE-2008-5077 CNCVE ID:CNCVE-20085077 OpenSSL是一款开放源码的SSL实现,用来实现网络通信的高强度加密。 部分OpenSSL函数验证DSA和ECDSA密钥时不正确验证"EVP_VerifyFinal()"函数返回值,发送特殊构建的签名证书链给客户端,可绕过签名检查。 通过恶意服务器或中间人攻击,可使证书链中的畸形SSL/TLS签名绕过客户端软件检查,导致盲目信任并泄漏敏感信息。 成功利用此漏洞需要服务器使用包含DSA或者ECDSA密钥的证书。 Ubuntu Ubuntu Linux 8.10 sparc Ubuntu Ubuntu Linux 8.10 powerpc Ubuntu Ubuntu Linux 8.10 lpia Ubuntu Ubuntu Linux 8.10 i386 Ubuntu Ubuntu Linux 8.10 amd64 Ubuntu Ubuntu Linux 8.04 LTS sparc Ubuntu Ubuntu Linux 8.04 LTS powerpc Ubuntu Ubuntu Linux 8.04 LTS lpia Ubuntu Ubuntu Linux 8.04 LTS i386 Ubuntu Ubuntu Linux 8.04 LTS amd64 Ubuntu Ubuntu Linux 7.10 sparc Ubuntu Ubuntu Linux 7.10 powerpc Ubuntu Ubuntu Linux 7.10 lpia Ubuntu Ubuntu Linux 7.10 i386 Ubuntu Ubuntu Linux 7.10 amd64 Ubuntu Ubuntu Linux 6.06 LTS sparc Ubuntu Ubuntu Linux 6.06 LTS powerpc Ubuntu Ubuntu Linux 6.06 LTS i386 Ubuntu Ubuntu Linux 6.06 LTS amd64 Sun Grid Engine 5.3 x86 Sun Grid Engine 5.3 Sun Linux Sun Grid Engine 5.3 64-bit SPARC Sun Grid Engine 5.3 32-bit SPARC Sun Grid Engine 5.3 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux WS 3 RedHat Enterprise Linux WS 2.1 IA64 RedHat Enterprise Linux WS 2.1 RedHat Enterprise Linux ES 4 RedHat Enterprise Linux ES 3 RedHat Enterprise Linux ES 2.1 IA64 RedHat Enterprise Linux ES 2.1 RedHat Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop 5 client RedHat Enterprise Linux AS 4 RedHat Enterprise Linux AS 3 RedHat Enterprise Linux AS 2.1 IA64 RedHat Enterprise Linux AS 2.1 RedHat Enterprise Linux 5 server RedHat Desktop 3.0 OpenSSL Project OpenSSL 0.9.8 i OpenSSL Project OpenSSL 0.9.8 e OpenSSL Project OpenSSL 0.9.8 d OpenSSL Project OpenSSL 0.9.8 c OpenSSL Project OpenSSL 0.9.8 b OpenSSL Project OpenSSL 0.9.8 a OpenSSL Project OpenSSL 0.9.8 + Gentoo Linux OpenSSL Project OpenSSL 0.9.7 m OpenSSL Project OpenSSL 0.9.7 l OpenSSL Project OpenSSL 0.9.7 k OpenSSL Project OpenSSL 0.9.7 j OpenSSL Project OpenSSL 0.9.7 i OpenSSL Project OpenSSL 0.9.7 h OpenSSL Project OpenSSL 0.9.7 g OpenSSL Project OpenSSL 0.9.7 f OpenSSL Project OpenSSL 0.9.7 e OpenSSL Project OpenSSL 0.9.7 d OpenSSL Project OpenSSL 0.9.7 c + OpenPKG OpenPKG 2.0 + Slackware Linux 9.1 + Slackware Linux 9.0 + Slackware Linux -current OpenSSL Project OpenSSL 0.9.7 beta3 OpenSSL Project OpenSSL 0.9.7 beta2 OpenSSL Project OpenSSL 0.9.7 beta1 OpenSSL Project OpenSSL 0.9.7 b + OpenPKG OpenPKG 1.3 OpenSSL Project OpenSSL 0.9.7 a + Conectiva Linux 9.0 + OpenPKG OpenPKG Current OpenSSL Project OpenSSL 0.9.7 OpenSSL Project OpenSSL 0.9.6 m OpenSSL Project OpenSSL 0.9.6 l OpenSSL Project OpenSSL 0.9.6 k OpenSSL Project OpenSSL 0.9.6 j OpenSSL Project OpenSSL 0.9.6 i OpenSSL Project OpenSSL 0.9.6 h OpenSSL Project OpenSSL 0.9.6 g + Conectiva Linux Enterprise Edition 1.0 + FreeBSD FreeBSD 4.7 -RELEASE + FreeBSD FreeBSD 4.7 + HP Apache-Based Web Server 2.0.43 .04 + HP Apache-Based Web Server 2.0.43 .00 + HP Webmin-Based Admin 1.0 .01 + Immunix Immunix OS 7+ + NetBSD NetBSD 1.6 + OpenPKG OpenPKG 1.1 OpenSSL Project OpenSSL 0.9.6 f OpenSSL Project OpenSSL 0.9.6 e + FreeBSD FreeBSD 4.6 -RELEASE + FreeBSD FreeBSD 4.6 OpenSSL Project OpenSSL 0.9.6 d + Slackware Linux 8.1 OpenSSL Project OpenSSL 0.9.6 c + Conectiva Linux 8.0 + Debian Linux 3.0 sparc + Debian Linux 3.0 s/390 + Debian Linux 3.0 ppc + Debian Linux 3.0 mipsel + Debian Linux 3.0 mips + Debian Linux 3.0 m68k + Debian Linux 3.0 ia-64 + Debian Linux 3.0 ia-32 + Debian Linux 3.0 hppa + Debian Linux 3.0 arm + Debian Linux 3.0 alpha + Debian Linux 3.0 + MandrakeSoft Linux Mandrake 8.2 + S.u.S.E. Linux 8.0 i386 + S.u.S.E. Linux 8.0 OpenSSL Project OpenSSL 0.9.6 b-36.8 OpenSSL Project OpenSSL 0.9.6 b + MandrakeSoft Linux Mandrake 8.1 ia64 + MandrakeSoft Linux Mandrake 8.1 + OpenBSD OpenBSD 3.1 + OpenBSD OpenBSD 3.0 + RedHat Enterprise Linux AS 2.1 IA64 + RedHat Enterprise Linux AS 2.1 + RedHat Enterprise Linux ES 2.1 IA64 + RedHat Enterprise Linux ES 2.1 + RedHat Enterprise Linux WS 2.1 IA64 + RedHat Enterprise Linux WS 2.1 + RedHat Linux 7.3 i386 + RedHat Linux 7.3 + RedHat Linux 7.2 ia64 + RedHat Linux 7.2 i686 + RedHat Linux 7.2 i386 + RedHat Linux 7.2 + RedHat Linux Advanced Work Station 2.1 + S.u.S.E. Linux 7.3 sparc + S.u.S.E. Linux 7.3 ppc + S.u.S.E. Linux 7.3 i386 + S.u.S.E. Linux Connectivity Server + S.u.S.E. Linux Database Server 0 + S.u.S.E. Linux Enterprise Server 7 + S.u.S.E. Linux Firewall on CD + S.u.S.E. Office Server + S.u.S.E. SuSE eMail Server III + Sun Linux 5.0.7 + Sun Linux 5.0.6 + Sun Linux 5.0.5 + Sun Linux 5.0.3 + Sun Linux 5.0 OpenSSL Project OpenSSL 0.9.6 a + Conectiva Linux 7.0 + NetBSD NetBSD 1.5.3 + NetBSD NetBSD 1.5.2 + NetBSD NetBSD 1.5.1 + NetBSD NetBSD 1.5 + S.u.S.E. Linux 7.2 i386 + S.u.S.E. Linux 7.1 sparc + S.u.S.E. Linux 7.1 ppc + S.u.S.E. Linux 7.1 alpha + S.u.S.E. Linux 7.1 OpenSSL Project OpenSSL 0.9.6 + Caldera OpenLinux Server 3.1.1 + Caldera OpenLinux Server 3.1 + Caldera OpenLinux Workstation 3.1.1 + Caldera OpenLinux Workstation 3.1 + Conectiva Linux 6.0 + EnGarde Secure Linux 1.0.1 + HP Secure OS software for Linux 1.0 + MandrakeSoft Linux Mandrake 8.0 ppc + MandrakeSoft Linux Mandrake 8.0 + NetBSD NetBSD 1.6 beta + NetBSD NetBSD 1.6 + NetBSD NetBSD 1.5.3 + NetBSD NetBSD 1.5.2 + NetBSD NetBSD 1.5.1 + NetBSD NetBSD 1.5 + OpenBSD OpenBSD 2.9 + OpenPKG OpenPKG 1.0 + RedHat Linux 7.3 i386 + RedHat Linux 7.3 + RedHat Linux 7.2 i386 + RedHat Linux 7.2 alpha + RedHat Linux 7.1 i386 + RedHat Linux 7.1 alpha + RedHat Linux 7.0 sparc + RedHat Linux 7.0 i386 + RedHat Linux 7.0 alpha + Trustix Secure Linux 1.5 + Trustix Secure Linux 1.2 + Trustix Secure Linux 1.1 OpenSSL Project OpenSSL 0.9.5 a + Debian Linux 3.0 + HP Secure OS software for Linux 1.0 + Immunix Immunix OS 7.0 + Immunix Immunix OS 6.2 + MandrakeSoft Corporate Server 1.0.1 + MandrakeSoft Linux Mandrake 7.2 + MandrakeSoft Linux Mandrake 7.1 + MandrakeSoft Single Network Firewall 7.2 + OpenBSD OpenBSD 2.8 + OpenBSD OpenBSD 2.7 + RedHat Linux 7.3 i386 + RedHat Linux 7.2 ia64 + RedHat Linux 7.2 i686 + RedHat Linux 7.2 i386 + RedHat Linux 7.2 alpha + RedHat Linux 7.2 + RedHat Linux 7.1 ia64 + RedHat Linux 7.1 i386 + RedHat Linux 7.1 alpha + RedHat Linux 7.1 + RedHat Linux 7.0 i386 + RedHat Linux 7.0 alpha + RedHat Linux 7.0 + RedHat Linux 6.2 sparc + RedHat Linux 6.2 i386 + RedHat Linux 6.2 alpha + RedHat Linux 6.2 + S.u.S.E. Linux 7.0 sparc + S.u.S.E. Linux 7.0 ppc + S.u.S.E. Linux 7.0 i386 + S.u.S.E. Linux 7.0 alpha OpenSSL Project OpenSSL 0.9.5 + RedHat Linux 6.2 sparc + RedHat Linux 6.2 i386 + RedHat Linux 6.2 alpha OpenSSL Project OpenSSL 0.9.4 OpenSSL Project OpenSSL 0.9.3 OpenSSL Project OpenSSL 0.9.2 b OpenSSL Project OpenSSL 0.9.1 c OpenSSL Project OpenSSL 0.9.8h OpenSSL Project OpenSSL 0.9.8g OpenSSL Project OpenSSL 0.9.8f OpenSSL Project OpenSSL 0.9.8 f NTP NTP 4.2.5 p150 NTP NTP 4.2.4 p5 Gale Gale 0.99 FreeBSD FreeBSD 7.1-STABLE FreeBSD FreeBSD 7.1 -RELEASE-p1 FreeBSD FreeBSD 7.1 -PRE-RELEASE FreeBSD FreeBSD 7.0-STABLE FreeBSD FreeBSD 7.0-RELEASE-p8 FreeBSD FreeBSD 7.0-RELEASE FreeBSD FreeBSD 7.0 BETA4 FreeBSD FreeBSD 7.0 -RELENG FreeBSD FreeBSD 7.0 -PRERELEASE FreeBSD FreeBSD 7.0 FreeBSD FreeBSD 6.4-RELEASE-p2 FreeBSD FreeBSD 6.4 -STABLE FreeBSD FreeBSD 6.4 -RELEASE FreeBSD FreeBSD 6.3 -RELENG FreeBSD FreeBSD 6.3 -RELEASE-p8 FreeBSD FreeBSD 6.3 -RELEASE-p6 FreeBSD FreeBSD 6.3 FreeBSD FreeBSD 6.2 -STABLE FreeBSD FreeBSD 6.2 -RELENG FreeBSD FreeBSD 6.2 不受影响系统 Sun Grid Engine 6.0 OpenSSL Project OpenSSL 0.9.8 j NTP NTP 4.2.5 p153 NTP NTP 4.2.4 p6 厂商解决方案 可参考如下补丁或升级程序: FreeBSD FreeBSD 6.3 FreeBSD openssl6.patch <a href=http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch</a> Ubuntu Ubuntu Linux 7.10 powerpc Ubuntu libcrypto0.9.8-udeb_0.9.8e-5ubuntu3.3_powerpc.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8e-5ubuntu3.3_powerpc.udeb Ubuntu libssl-dev_0.9.8e-5ubuntu3.3_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> e-5ubuntu3.3_powerpc.deb Ubuntu libssl0.9.8-dbg_0.9.8e-5ubuntu3.3_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8e-5ubuntu3.3_powerpc.deb Ubuntu libssl0.9.8_0.9.8e-5ubuntu3.3_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8e-5ubuntu3.3_powerpc.deb Ubuntu openssl_0.9.8e-5ubuntu3.3_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5</a> ubuntu3.3_powerpc.deb Ubuntu Ubuntu Linux 8.04 LTS powerpc Ubuntu libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.4_powerpc.udeb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g</a> -4ubuntu3.4_powerpc.udeb Ubuntu libssl-dev_0.9.8g-4ubuntu3.4_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3 target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3</a> .4_powerpc.deb Ubuntu libssl0.9.8-dbg_0.9.8g-4ubuntu3.4_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ub target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ub</a> untu3.4_powerpc.deb Ubuntu libssl0.9.8_0.9.8g-4ubuntu3.4_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu</a> 3.4_powerpc.deb Ubuntu openssl-doc_0.9.8g-4ubuntu3.4_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-4ubuntu3.4_all.deb Ubuntu openssl_0.9.8g-4ubuntu3.4_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.4_ target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.4_</a> powerpc.deb Ubuntu Ubuntu Linux 8.10 powerpc Ubuntu libcrypto0.9.8-udeb_0.9.8g-10.1ubuntu2.1_powerpc.udeb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g</a> -10.1ubuntu2.1_powerpc.udeb Ubuntu libssl-dev_0.9.8g-10.1ubuntu2.1_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-10.1ubun target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-10.1ubun</a> tu2.1_powerpc.deb Ubuntu libssl0.9.8-dbg_0.9.8g-10.1ubuntu2.1_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10. target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10.</a> 1ubuntu2.1_powerpc.deb Ubuntu libssl0.9.8_0.9.8g-10.1ubuntu2.1_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1ubu target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1ubu</a> ntu2.1_powerpc.deb Ubuntu openssl-doc_0.9.8g-10.1ubuntu2.1_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-10.1ubuntu2.1_all.deb Ubuntu openssl_0.9.8g-10.1ubuntu2.1_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-10.1ubuntu2 target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-10.1ubuntu2</a> .1_powerpc.deb Ubuntu Ubuntu Linux 8.04 LTS sparc Ubuntu libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.4_sparc.udeb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g</a> -4ubuntu3.4_sparc.udeb Ubuntu libssl-dev_0.9.8g-4ubuntu3.4_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3 target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3</a> .4_sparc.deb Ubuntu libssl0.9.8-dbg_0.9.8g-4ubuntu3.4_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ub target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ub</a> untu3.4_sparc.deb Ubuntu libssl0.9.8_0.9.8g-4ubuntu3.4_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu</a> 3.4_sparc.deb Ubuntu openssl-doc_0.9.8g-4ubuntu3.4_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-4ubuntu3.4_all.deb Ubuntu openssl_0.9.8g-4ubuntu3.4_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.4_ target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.4_</a> sparc.deb Ubuntu Ubuntu Linux 6.06 LTS sparc Ubuntu libcrypto0.9.8-udeb_0.9.8a-7ubuntu0.6_sparc.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8a-7ubuntu0.6_sparc.udeb Ubuntu libssl-dev_0.9.8a-7ubuntu0.6_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> a-7ubuntu0.6_sparc.deb Ubuntu libssl0.9.8-dbg_0.9.8a-7ubuntu0.6_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8a-7ubuntu0.6_sparc.deb Ubuntu libssl0.9.8_0.9.8a-7ubuntu0.6_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8a-7ubuntu0.6_sparc.deb Ubuntu openssl_0.9.8a-7ubuntu0.6_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8a-7 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8a-7</a> ubuntu0.6_sparc.deb OpenSSL Project OpenSSL 0.9.8g OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> Ubuntu Ubuntu Linux 8.04 LTS amd64 Ubuntu libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.4_amd64.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8g-4ubuntu3.4_amd64.udeb Ubuntu libssl-dev_0.9.8g-4ubuntu3.4_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> g-4ubuntu3.4_amd64.deb Ubuntu libssl0.9.8-dbg_0.9.8g-4ubuntu3.4_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8g-4ubuntu3.4_amd64.deb Ubuntu libssl0.9.8_0.9.8g-4ubuntu3.4_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8g-4ubuntu3.4_amd64.deb Ubuntu openssl-doc_0.9.8g-4ubuntu3.4_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-4ubuntu3.4_all.deb Ubuntu openssl_0.9.8g-4ubuntu3.4_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4</a> ubuntu3.4_amd64.deb FreeBSD FreeBSD 7.0-RELEASE FreeBSD openssl.patch <a href=http://security.FreeBSD.org/patches/SA-09:02/openssl.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl.patch</a> Ubuntu Ubuntu Linux 7.10 sparc Ubuntu libcrypto0.9.8-udeb_0.9.8e-5ubuntu3.3_sparc.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8e-5ubuntu3.3_sparc.udeb Ubuntu libssl-dev_0.9.8e-5ubuntu3.3_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> e-5ubuntu3.3_sparc.deb Ubuntu libssl0.9.8-dbg_0.9.8e-5ubuntu3.3_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8e-5ubuntu3.3_sparc.deb Ubuntu libssl0.9.8_0.9.8e-5ubuntu3.3_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8e-5ubuntu3.3_sparc.deb Ubuntu openssl_0.9.8e-5ubuntu3.3_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5</a> ubuntu3.3_sparc.deb FreeBSD FreeBSD 6.4 -STABLE FreeBSD openssl6.patch <a href=http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch</a> Ubuntu Ubuntu Linux 8.10 sparc Ubuntu libcrypto0.9.8-udeb_0.9.8g-10.1ubuntu2.1_sparc.udeb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g</a> -10.1ubuntu2.1_sparc.udeb Ubuntu libssl-dev_0.9.8g-10.1ubuntu2.1_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-10.1ubun target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-10.1ubun</a> tu2.1_sparc.deb Ubuntu libssl0.9.8-dbg_0.9.8g-10.1ubuntu2.1_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10. target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10.</a> 1ubuntu2.1_sparc.deb Ubuntu libssl0.9.8_0.9.8g-10.1ubuntu2.1_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1ubu target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1ubu</a> ntu2.1_sparc.deb Ubuntu openssl-doc_0.9.8g-10.1ubuntu2.1_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-10.1ubuntu2.1_all.deb Ubuntu openssl_0.9.8g-10.1ubuntu2.1_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-10.1ubuntu2 target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-10.1ubuntu2</a> .1_sparc.deb FreeBSD FreeBSD 7.1-STABLE FreeBSD openssl.patch <a href=http://security.FreeBSD.org/patches/SA-09:02/openssl.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl.patch</a> FreeBSD FreeBSD 6.3 -RELENG FreeBSD openssl6.patch <a href=http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch</a> OpenSSL Project OpenSSL 0.9.8h OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> Ubuntu Ubuntu Linux 8.10 amd64 Ubuntu libcrypto0.9.8-udeb_0.9.8g-10.1ubuntu2.1_amd64.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8g-10.1ubuntu2.1_amd64.udeb Ubuntu libssl-dev_0.9.8g-10.1ubuntu2.1_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> g-10.1ubuntu2.1_amd64.deb Ubuntu libssl0.9.8-dbg_0.9.8g-10.1ubuntu2.1_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8g-10.1ubuntu2.1_amd64.deb Ubuntu libssl0.9.8_0.9.8g-10.1ubuntu2.1_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8g-10.1ubuntu2.1_amd64.deb Ubuntu openssl-doc_0.9.8g-10.1ubuntu2.1_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-10.1ubuntu2.1_all.deb Ubuntu openssl_0.9.8g-10.1ubuntu2.1_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-1 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-1</a> 0.1ubuntu2.1_amd64.deb OpenSSL Project OpenSSL 0.9.8f OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> Ubuntu Ubuntu Linux 8.10 i386 Ubuntu libcrypto0.9.8-udeb_0.9.8g-10.1ubuntu2.1_i386.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8g-10.1ubuntu2.1_i386.udeb Ubuntu libssl-dev_0.9.8g-10.1ubuntu2.1_i386.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> g-10.1ubuntu2.1_i386.deb Ubuntu libssl0.9.8-dbg_0.9.8g-10.1ubuntu2.1_i386.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8g-10.1ubuntu2.1_i386.deb Ubuntu libssl0.9.8_0.9.8g-10.1ubuntu2.1_i386.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8g-10.1ubuntu2.1_i386.deb Ubuntu openssl-doc_0.9.8g-10.1ubuntu2.1_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-10.1ubuntu2.1_all.deb Ubuntu openssl_0.9.8g-10.1ubuntu2.1_i386.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-1 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-1</a> 0.1ubuntu2.1_i386.deb OpenSSL Project OpenSSL 0.9.8 f OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> Ubuntu Ubuntu Linux 6.06 LTS powerpc Ubuntu libcrypto0.9.8-udeb_0.9.8a-7ubuntu0.6_powerpc.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8a-7ubuntu0.6_powerpc.udeb Ubuntu libssl-dev_0.9.8a-7ubuntu0.6_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> a-7ubuntu0.6_powerpc.deb Ubuntu libssl0.9.8-dbg_0.9.8a-7ubuntu0.6_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8a-7ubuntu0.6_powerpc.deb Ubuntu libssl0.9.8_0.9.8a-7ubuntu0.6_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8a-7ubuntu0.6_powerpc.deb Ubuntu openssl_0.9.8a-7ubuntu0.6_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8a-7 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8a-7</a> ubuntu0.6_powerpc.deb OpenSSL Project OpenSSL 0.9.1 c OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.2 b OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.3 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.5 a OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.5 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 j OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 d OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 c OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 b-36.8 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 e OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 h OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 a OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 f OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 b OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 g OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 f OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 i OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 m OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 c OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 beta2 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 beta1 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 j OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 a OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 l OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 e OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 h OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 g OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 beta3 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 b OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 k OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.8 a OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.8 i OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.8 c OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.8 b OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.8 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> |
id | SSV:4636 |
last seen | 2017-11-19 |
modified | 2009-01-08 |
published | 2009-01-08 |
reporter | Root |
title | OpenSSL 'EVP_VerifyFinal'函数签名验证漏洞 |
References
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
- http://marc.info/?l=bugtraq&m=123859864430555&w=2
- http://marc.info/?l=bugtraq&m=123859864430555&w=2
- http://marc.info/?l=bugtraq&m=123859864430555&w=2
- http://marc.info/?l=bugtraq&m=123859864430555&w=2
- http://marc.info/?l=bugtraq&m=124277349419254&w=2
- http://marc.info/?l=bugtraq&m=124277349419254&w=2
- http://marc.info/?l=bugtraq&m=124277349419254&w=2
- http://marc.info/?l=bugtraq&m=124277349419254&w=2
- http://marc.info/?l=bugtraq&m=127678688104458&w=2
- http://marc.info/?l=bugtraq&m=127678688104458&w=2
- http://secunia.com/advisories/33338
- http://secunia.com/advisories/33338
- http://secunia.com/advisories/33394
- http://secunia.com/advisories/33394
- http://secunia.com/advisories/33436
- http://secunia.com/advisories/33436
- http://secunia.com/advisories/33557
- http://secunia.com/advisories/33557
- http://secunia.com/advisories/33673
- http://secunia.com/advisories/33673
- http://secunia.com/advisories/33765
- http://secunia.com/advisories/33765
- http://secunia.com/advisories/34211
- http://secunia.com/advisories/34211
- http://secunia.com/advisories/35074
- http://secunia.com/advisories/35074
- http://secunia.com/advisories/35108
- http://secunia.com/advisories/35108
- http://secunia.com/advisories/39005
- http://secunia.com/advisories/39005
- http://security.gentoo.org/glsa/glsa-200902-02.xml
- http://security.gentoo.org/glsa/glsa-200902-02.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.544796
- http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.544796
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-250826-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-250826-1
- http://support.apple.com/kb/HT3549
- http://support.apple.com/kb/HT3549
- http://support.avaya.com/elmodocs2/security/ASA-2009-038.htm
- http://support.avaya.com/elmodocs2/security/ASA-2009-038.htm
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=837653
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=837653
- http://voodoo-circle.sourceforge.net/sa/sa-20090123-01.html
- http://voodoo-circle.sourceforge.net/sa/sa-20090123-01.html
- http://www.ocert.org/advisories/ocert-2008-016.html
- http://www.ocert.org/advisories/ocert-2008-016.html
- http://www.openssl.org/news/secadv_20090107.txt
- http://www.openssl.org/news/secadv_20090107.txt
- http://www.redhat.com/support/errata/RHSA-2009-0004.html
- http://www.redhat.com/support/errata/RHSA-2009-0004.html
- http://www.securityfocus.com/archive/1/499827/100/0/threaded
- http://www.securityfocus.com/archive/1/499827/100/0/threaded
- http://www.securityfocus.com/archive/1/502322/100/0/threaded
- http://www.securityfocus.com/archive/1/502322/100/0/threaded
- http://www.securityfocus.com/bid/33150
- http://www.securityfocus.com/bid/33150
- http://www.securitytracker.com/id?1021523
- http://www.securitytracker.com/id?1021523
- http://www.us-cert.gov/cas/techalerts/TA09-133A.html
- http://www.us-cert.gov/cas/techalerts/TA09-133A.html
- http://www.vmware.com/security/advisories/VMSA-2009-0004.html
- http://www.vmware.com/security/advisories/VMSA-2009-0004.html
- http://www.vupen.com/english/advisories/2009/0040
- http://www.vupen.com/english/advisories/2009/0040
- http://www.vupen.com/english/advisories/2009/0289
- http://www.vupen.com/english/advisories/2009/0289
- http://www.vupen.com/english/advisories/2009/0362
- http://www.vupen.com/english/advisories/2009/0362
- http://www.vupen.com/english/advisories/2009/0558
- http://www.vupen.com/english/advisories/2009/0558
- http://www.vupen.com/english/advisories/2009/0904
- http://www.vupen.com/english/advisories/2009/0904
- http://www.vupen.com/english/advisories/2009/0913
- http://www.vupen.com/english/advisories/2009/0913
- http://www.vupen.com/english/advisories/2009/1297
- http://www.vupen.com/english/advisories/2009/1297
- http://www.vupen.com/english/advisories/2009/1338
- http://www.vupen.com/english/advisories/2009/1338
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6380
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6380
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9155
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9155
- https://usn.ubuntu.com/704-1/
- https://usn.ubuntu.com/704-1/