Vulnerabilities > CVE-2008-5077 - Improper Input Validation vulnerability in Openssl

047910
CVSS 5.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
openssl
CWE-20
nessus

Summary

OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Server Side Include (SSI) Injection
    An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
  • Cross Zone Scripting
    An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security. In a zone-based model, pages belong to one of a set of zones corresponding to the level of privilege assigned to that page. Pages in an untrusted zone would have a lesser level of access to the system and/or be restricted in the types of executable content it was allowed to invoke. In a cross-zone scripting attack, a page that should be assigned to a less privileged zone is granted the privileges of a more trusted zone. This can be accomplished by exploiting bugs in the browser, exploiting incorrect configuration in the zone controls, through a cross-site scripting attack that causes the attackers' content to be treated as coming from a more trusted page, or by leveraging some piece of system functionality that is accessible from both the trusted and less trusted zone. This attack differs from "Restful Privilege Escalation" in that the latter correlates to the inadequate securing of RESTful access methods (such as HTTP DELETE) on the server, while cross-zone scripting attacks the concept of security zones as implemented by a browser.
  • Cross Site Scripting through Log Files
    An attacker may leverage a system weakness where logs are susceptible to log injection to insert scripts into the system's logs. If these logs are later viewed by an administrator through a thin administrative interface and the log data is not properly HTML encoded before being written to the page, the attackers' scripts stored in the log will be executed in the administrative interface with potentially serious consequences. This attack pattern is really a combination of two other attack patterns: log injection and stored cross site scripting.
  • Command Line Execution through SQL Injection
    An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2009-037.NASL
    descriptionInternet Systems Consortium (ISC) BIND 9.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077 and CVE-2009-0025. In this particular case the DSA_verify function was fixed with MDVSA-2009:002, this update does however address the RSA_verify function (CVE-2009-0265).
    last seen2020-06-01
    modified2020-06-02
    plugin id36346
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/36346
    titleMandriva Linux Security Advisory : bind (MDVSA-2009:037)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_4_COMPAT-OPENSSL097G-110721.NASL
    descriptionThis update adds openssl patches since 2007 for : - CVE-2008-5077 - CVE-2009-0590 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180
    last seen2020-06-01
    modified2020-06-02
    plugin id75802
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75802
    titleopenSUSE Security Update : compat-openssl097g (openSUSE-SU-2011:0845-1)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2009-014-03.NASL
    descriptionNew ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, and -current to a fix security issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id35377
    published2009-01-15
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35377
    titleSlackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 8.1 / 9.0 / 9.1 / current : ntp (SSA:2009-014-03)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_0_COMPAT-OPENSSL097G-090127.NASL
    descriptionThis update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077)
    last seen2020-06-01
    modified2020-06-02
    plugin id39937
    published2009-07-21
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/39937
    titleopenSUSE Security Update : compat-openssl097g (compat-openssl097g-480)
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0020_OPENSSL098E.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has openssl098e packages installed that are affected by multiple vulnerabilities: - OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition. (CVE-2006-2937) - OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) public exponent or (2) public modulus values in X.509 certificates that require extra time to process when using RSA signature verification. (CVE-2006-2940) - Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers. (CVE-2006-3738) - OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. (CVE-2006-4339) - The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference. (CVE-2006-4343) - The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys. (CVE-2007-3108) - Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors. (CVE-2007-4995) - Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible. (CVE-2007-5135) - OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys. (CVE-2008-5077) - The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length. (CVE-2009-0590) - The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of future epoch DTLS records that are buffered in a queue, aka DTLS record buffer limitation bug. (CVE-2009-1377) - Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka DTLS fragment handling memory leak. (CVE-2009-1378) - Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate. (CVE-2009-1379) - ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello. (CVE-2009-1386) - The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of- sequence DTLS handshake message, related to a fragment bug. (CVE-2009-1387) - The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large. (CVE-2009-2409) - OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors. (CVE-2009-3245) - The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post- renegotiation context, related to a plaintext injection attack, aka the Project Mogul issue. (CVE-2009-3555) - Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678. (CVE-2009-4355) - The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot. (CVE-2010-0433) - The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. (CVE-2012-2110) - The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the- middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a CRIME attack. (CVE-2012-4929) - OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key. (CVE-2013-0166) - The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side- channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the Lucky Thirteen issue. (CVE-2013-0169) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127177
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127177
    titleNewStart CGSL CORE 5.04 / MAIN 5.04 : openssl098e Multiple Vulnerabilities (NS-SA-2019-0020)
  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2009-0004.NASL
    descriptiona. Updated OpenSSL package for the Service Console fixes a security issue. OpenSSL 0.9.7a-33.24 and earlier does not properly check the return value from the EVP_VerifyFinal function, which could allow a remote attacker to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2008-5077 to this issue. b. Update bind package for the Service Console fixes a security issue. A flaw was discovered in the way Berkeley Internet Name Domain (BIND) checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2009-0025 to this issue. c. Updated vim package for the Service Console addresses several security issues. Several input flaws were found in Visual editor IMproved
    last seen2020-06-01
    modified2020-06-02
    plugin id40389
    published2009-07-27
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40389
    titleVMSA-2009-0004 : ESX Service Console updates for openssl, bind, and vim
  • NASL familySuSE Local Security Checks
    NASL idSUSE_COMPAT-OPENSSL097G-7645.NASL
    descriptionThis update adds openssl patches since 2007 for : - CVE-2009-0590 - CVE-2008-5077 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180
    last seen2020-06-01
    modified2020-06-02
    plugin id57170
    published2011-12-13
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57170
    titleSuSE 10 Security Update : compat-openssl097g (ZYPP Patch Number 7645)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_COMPAT-OPENSSL097G-5957.NASL
    descriptionThis update improves the verification of return values. Prior to this update it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077)
    last seen2020-06-01
    modified2020-06-02
    plugin id41490
    published2009-09-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/41490
    titleSuSE 10 Security Update : compat-openssl097g (ZYPP Patch Number 5957)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2009-014-02.NASL
    descriptionNew bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, and -current to fix a security issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id54870
    published2011-05-28
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/54870
    titleSlackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 8.1 / 9.0 / 9.1 / current : bind (SSA:2009-014-02)
  • NASL familyCGI abuses
    NASL idHPSMH_3_0_1_73.NASL
    descriptionAccording to its self-reported version number, the HP System Management Homepage install on the remote host is earlier than 3.0.1.73. Such versions are reportedly affected by multiple flaws : - A weakness in PHP could be exploited to perform cross- site scripting attacks, provided PHP directive
    last seen2020-06-01
    modified2020-06-02
    plugin id38832
    published2009-05-20
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/38832
    titleHP System Management Homepage < 3.0.1.73 Multiple Flaws
  • NASL familySuSE Local Security Checks
    NASL idSUSE_LIBOPENSSL-DEVEL-5951.NASL
    descriptionThis update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077)
    last seen2020-06-01
    modified2020-06-02
    plugin id35459
    published2009-01-26
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/35459
    titleopenSUSE 10 Security Update : libopenssl-devel (libopenssl-devel-5951)
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL11503.NASL
    descriptionThe remote BIG-IP device is missing a patch required by a security advisory.
    last seen2020-06-01
    modified2020-06-02
    plugin id78125
    published2014-10-10
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78125
    titleF5 Networks BIG-IP : BIND 9 vulnerability (SOL11503)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_139501-02.NASL
    descriptionSunOS 5.10_x86: openssl patch. Date this patch was last updated by Sun : Feb/24/09
    last seen2020-06-01
    modified2020-06-02
    plugin id108014
    published2018-03-12
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/108014
    titleSolaris 10 (x86) : 139501-02
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2009-0004.NASL
    descriptionUpdated OpenSSL packages that correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength, general purpose, cryptography library. The Google security team discovered a flaw in the way OpenSSL checked the verification of certificates. An attacker in control of a malicious server, or able to effect a
    last seen2020-06-01
    modified2020-06-02
    plugin id35310
    published2009-01-08
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35310
    titleCentOS 3 / 4 / 5 : openssl (CESA-2009:0004)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-0544.NASL
    descriptionThis update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id36222
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/36222
    titleFedora 10 : ntp-4.2.4p6-1.fc10 (2009-0544)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-704-1.NASL
    descriptionIt was discovered that OpenSSL did not properly perform signature verification on DSA and ECDSA keys. If user or automated system connected to a malicious server or a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to view sensitive information. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id36382
    published2009-04-23
    reporterUbuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/36382
    titleUbuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : openssl vulnerability (USN-704-1)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2009-0020.NASL
    descriptionFrom Red Hat Security Advisory 2009:0020 : Updated Bind packages to correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. A flaw was discovered in the way BIND checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. (CVE-2009-0025) For users of Red Hat Enterprise Linux 3 this update also addresses a bug which can cause BIND to occasionally exit with an assertion failure. All BIND users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. After installing the update, BIND daemon will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id67792
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67792
    titleOracle Linux 3 / 4 / 5 : bind (ELSA-2009-0020)
  • NASL familyWeb Servers
    NASL idOPENSSL_0_9_8J.NASL
    descriptionAccording to its banner, the remote server is running a version of OpenSSL that is earlier than 0.9.8j. A remote attacker could implement a man-in-the-middle attack by forging an SSL/TLS signature using DSA and ECDSA keys which bypass validation of the certificate chain.
    last seen2020-06-01
    modified2020-06-02
    plugin id17762
    published2012-01-04
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/17762
    titleOpenSSL < 0.9.8j Signature Spoofing
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-0547.NASL
    descriptionThis update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id35455
    published2009-01-26
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35455
    titleFedora 9 : ntp-4.2.4p6-1.fc9 (2009-0547)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200904-05.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200904-05 (ntp: Certificate validation error) It has been reported that ntp incorrectly checks the return value of the EVP_VerifyFinal(), a vulnerability related to CVE-2008-5077 (GLSA 200902-02). Impact : A remote attacker could exploit this vulnerability to spoof arbitrary names to conduct Man-In-The-Middle attacks and intercept sensitive information. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id36093
    published2009-04-07
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/36093
    titleGLSA-200904-05 : ntp: Certificate validation error
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2009-0020.NASL
    descriptionUpdated Bind packages to correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. A flaw was discovered in the way BIND checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. (CVE-2009-0025) For users of Red Hat Enterprise Linux 3 this update also addresses a bug which can cause BIND to occasionally exit with an assertion failure. All BIND users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. After installing the update, BIND daemon will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id35589
    published2009-02-05
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35589
    titleCentOS 3 / 4 / 5 : bind (CESA-2009:0020)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_OPENSSL-5949.NASL
    descriptionThis update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077)
    last seen2020-06-01
    modified2020-06-02
    plugin id41570
    published2009-09-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/41570
    titleSuSE 10 Security Update : openssl (ZYPP Patch Number 5949)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-0331.NASL
    descriptionOnly one important security fix and one trivial enhancement/bug fix. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id36344
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/36344
    titleFedora 10 : openssl-0.9.8g-12.fc10 (2009-0331)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_COMPAT-OPENSSL097G-5964.NASL
    descriptionThis update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077)
    last seen2020-06-01
    modified2020-06-02
    plugin id35471
    published2009-01-28
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/35471
    titleopenSUSE 10 Security Update : compat-openssl097g (compat-openssl097g-5964)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_COMPAT-OPENSSL097G-110721.NASL
    descriptionThis update adds openssl patches since 2007 for : - CVE-2009-0590 - CVE-2008-5077 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180
    last seen2020-06-01
    modified2020-06-02
    plugin id55711
    published2011-07-28
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55711
    titleSuSE 11.1 Security Update : compat-openssl097g (SAT Patch Number 4913)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2009-0004.NASL
    descriptionFrom Red Hat Security Advisory 2009:0004 : Updated OpenSSL packages that correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength, general purpose, cryptography library. The Google security team discovered a flaw in the way OpenSSL checked the verification of certificates. An attacker in control of a malicious server, or able to effect a
    last seen2020-06-01
    modified2020-06-02
    plugin id67783
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67783
    titleOracle Linux 3 / 4 / 5 : openssl (ELSA-2009-0004)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2009-0004.NASL
    descriptionUpdated OpenSSL packages that correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength, general purpose, cryptography library. The Google security team discovered a flaw in the way OpenSSL checked the verification of certificates. An attacker in control of a malicious server, or able to effect a
    last seen2020-06-01
    modified2020-06-02
    plugin id35316
    published2009-01-08
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35316
    titleRHEL 2.1 / 3 / 4 / 5 : openssl (RHSA-2009:0004)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_139500.NASL
    descriptionSunOS 5.10: openssl patch. Date this patch was last updated by Sun : Apr/01/09
    last seen2018-09-01
    modified2018-08-13
    plugin id38118
    published2009-04-23
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=38118
    titleSolaris 10 (sparc) : 139500-04
  • NASL familySuSE Local Security Checks
    NASL idSUSE_COMPAT-OPENSSL097G-7644.NASL
    descriptionThis update adds openssl patches since 2007 for : - CVE-2009-0590 - CVE-2008-5077 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180
    last seen2020-06-01
    modified2020-06-02
    plugin id55715
    published2011-07-28
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55715
    titleSuSE 10 Security Update : compat-openssl097g (ZYPP Patch Number 7644)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-705-1.NASL
    descriptionIt was discovered that NTP did not properly perform signature verification. A remote attacker could exploit this to bypass certificate validation via a malformed SSL/TLS signature. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id37876
    published2009-04-23
    reporterUbuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/37876
    titleUbuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : ntp vulnerability (USN-705-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_1_COMPAT-OPENSSL097G-090204.NASL
    descriptionThis update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077)
    last seen2020-06-01
    modified2020-06-02
    plugin id40203
    published2009-07-21
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40203
    titleopenSUSE Security Update : compat-openssl097g (compat-openssl097g-480)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2009-014-01.NASL
    descriptionNew openssl packages are available for Slackware 11.0, 12.0, 12.1, 12.2, and -current to fix a security issue when connecting to an SSL/TLS server that uses a certificate containing a DSA or ECDSA key.
    last seen2020-06-01
    modified2020-06-02
    plugin id35376
    published2009-01-15
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35376
    titleSlackware 11.0 / 12.0 / 12.1 / 12.2 / current : openssl (SSA:2009-014-01)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2009-001.NASL
    descriptionA vulnerability was found by the Google Security Team with how OpenSSL checked the verification of certificates. An attacker in control of a malicious server or able to effect a man-in-the-middle attack, could present a malformed SSL/TLS signature from a certificate chain to a vulnerable client, which would then bypass the certificate validation (CVE-2008-5077). The updated packages have been patched to prevent this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id37839
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/37839
    titleMandriva Linux Security Advisory : openssl (MDVSA-2009:001)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2009-0046.NASL
    descriptionUpdated ntp packages to correct a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer
    last seen2020-06-01
    modified2020-06-02
    plugin id43728
    published2010-01-06
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43728
    titleCentOS 4 / 5 : ntp (CESA-2009:0046)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1547.NASL
    descriptionAccording to the versions of the openssl packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - A NULL pointer dereference flaw was found in OpenSSL
    last seen2020-06-01
    modified2020-06-02
    plugin id125000
    published2019-05-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125000
    titleEulerOS Virtualization 3.0.1.0 : openssl (EulerOS-SA-2019-1547)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2009-0046.NASL
    descriptionFrom Red Hat Security Advisory 2009:0046 : Updated ntp packages to correct a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer
    last seen2020-06-01
    modified2020-06-02
    plugin id67793
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67793
    titleOracle Linux 4 / 5 : ntp (ELSA-2009-0046)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1702.NASL
    descriptionIt has been discovered that NTP, an implementation of the Network Time Protocol, does not properly check the result of an OpenSSL function for verifying cryptographic signatures, which may ultimately lead to the acceptance of unauthenticated time information. (Note that cryptographic authentication of time servers is often not enabled in the first place.)
    last seen2020-06-01
    modified2020-06-02
    plugin id35365
    published2009-01-14
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35365
    titleDebian DSA-1702-1 : ntp - interpretation conflict
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-706-1.NASL
    descriptionIt was discovered that Bind did not properly perform signature verification. When DNSSEC with DSA signatures are in use, a remote attacker could exploit this to bypass signature validation to spoof DNS entries and poison DNS caches. Among other things, this could lead to misdirected email and web traffic. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id36220
    published2009-04-23
    reporterUbuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/36220
    titleUbuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : bind9 vulnerability (USN-706-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_0_LIBOPENSSL-DEVEL-090121.NASL
    descriptionThis update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077)
    last seen2020-06-01
    modified2020-06-02
    plugin id40032
    published2009-07-21
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40032
    titleopenSUSE Security Update : libopenssl-devel (libopenssl-devel-461)
  • NASL familySuSE Local Security Checks
    NASL idSUSE9_12341.NASL
    descriptionThis update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077)
    last seen2020-06-01
    modified2020-06-02
    plugin id41271
    published2009-09-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/41271
    titleSuSE9 Security Update : openssl (YOU Patch Number 12341)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2009-0011.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : CVE-2009-0159 Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response. CVE-2009-1252 Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field. CVE-2009-0021 NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077. - fix buffer overflow when parsing Autokey association message (#500783, CVE-2009-1252) - fix buffer overflow in ntpq (#500783, CVE-2009-0159) - fix check for malformed signatures (#479698, CVE-2009-0021) - fix selecting multicast interface (#444106) - disable kernel discipline when -x option is used (#431729) - avoid use of uninitialized floating-point values in clock_select (#250838) - generate man pages from html source, include config man pages (#307271) - add note about paths and exit codes to ntpd man page (#242925, #246568) - add section about exit codes to ntpd man page (#319591) - always return 0 in scriptlets - pass additional options to ntpdate (#240141) - fix broadcast client to accept broadcasts on 255.255.255.255 (#226958) - compile with crypto support on 64bit architectures (#239580) - add ncurses-devel to buildrequires (#239580) - exit with nonzero code if ntpd -q did not set clock (#240134) - fix return codes in init script (#240118)
    last seen2020-06-01
    modified2020-06-02
    plugin id79458
    published2014-11-26
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79458
    titleOracleVM 2.1 : ntp (OVMSA-2009-0011)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_10_5_7.NASL
    descriptionThe remote host is running a version of Mac OS X 10.5.x that is prior to 10.5.7. Mac OS X 10.5.7 contains security fixes for the following products : - Apache - ATS - BIND - CFNetwork - CoreGraphics - Cscope - CUPS - Disk Images - enscript - Flash Player plug-in - Help Viewer - iChat - International Components for Unicode - IPSec - Kerberos - Kernel - Launch Services - libxml - Net-SNMP - Network Time - Networking - OpenSSL - PHP - QuickDraw Manager - ruby - Safari - Spotlight - system_cmds - telnet - Terminal - WebKit - X11
    last seen2020-06-01
    modified2020-06-02
    plugin id38744
    published2009-05-13
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/38744
    titleMac OS X 10.5.x < 10.5.7 Multiple Vulnerabilities
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2009-0020.NASL
    descriptionUpdated Bind packages to correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. A flaw was discovered in the way BIND checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. (CVE-2009-0025) For users of Red Hat Enterprise Linux 3 this update also addresses a bug which can cause BIND to occasionally exit with an assertion failure. All BIND users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. After installing the update, BIND daemon will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id35324
    published2009-01-09
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35324
    titleRHEL 2.1 / 3 / 4 / 5 : bind (RHSA-2009:0020)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_3_COMPAT-OPENSSL097G-110721.NASL
    descriptionThis update adds openssl patches since 2007 for : - CVE-2008-5077 - CVE-2009-0590 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180
    last seen2020-06-01
    modified2020-06-02
    plugin id75453
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75453
    titleopenSUSE Security Update : compat-openssl097g (openSUSE-SU-2011:0845-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2009-0046.NASL
    descriptionUpdated ntp packages to correct a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Network Time Protocol (NTP) is used to synchronize a computer
    last seen2020-06-01
    modified2020-06-02
    plugin id35551
    published2009-01-29
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35551
    titleRHEL 4 / 5 : ntp (RHSA-2009:0046)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20090107_OPENSSL_ON_SL3_X.NASL
    descriptionThe Google security team discovered a flaw in the way OpenSSL checked the verification of certificates. An attacker in control of a malicious server, or able to effect a
    last seen2020-06-01
    modified2020-06-02
    plugin id60513
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60513
    titleScientific Linux Security Update : openssl on SL3.x, SL4.x, SL5.x i386/x86_64
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_139501.NASL
    descriptionSunOS 5.10_x86: openssl patch. Date this patch was last updated by Sun : Feb/24/09
    last seen2018-09-02
    modified2018-08-13
    plugin id36555
    published2009-04-23
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=36555
    titleSolaris 10 (x86) : 139501-02
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-0325.NASL
    descriptionOnly one important security fix and two very simple bugfixes. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id35397
    published2009-01-16
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35397
    titleFedora 9 : openssl-0.9.8g-9.12.fc9 (2009-0325)
  • NASL familyMisc.
    NASL idVMWARE_VMSA-2009-0004_REMOTE.NASL
    descriptionThe remote VMware ESX host is missing a security-related patch. It is, therefore, is affected by multiple vulnerabilities : - A format string flaw exists in the Vim help tag processor in the helptags_one() function that allows a remote attacker to execute arbitrary code by tricking a user into executing the
    last seen2020-06-01
    modified2020-06-02
    plugin id89112
    published2016-03-03
    reporterThis script is Copyright (C) 2016-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/89112
    titleVMware ESX Multiple Vulnerabilities (VMSA-2009-0004) (remote check)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200902-02.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200902-02 (OpenSSL: Certificate validation error) The Google Security Team reported that several functions incorrectly check the result after calling the EVP_VerifyFinal() function, allowing a malformed signature to be treated as a good signature rather than as an error. This issue affects the signature checks on DSA and ECDSA keys used with SSL/TLS. Impact : A remote attacker could exploit this vulnerability and spoof arbitrary names to conduct Man-In-The-Middle attacks and intercept sensitive information. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id35673
    published2009-02-13
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/35673
    titleGLSA-200902-02 : OpenSSL: Certificate validation error
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL9754.NASL
    descriptionThe remote BIG-IP device is missing a patch required by a security advisory.
    last seen2020-06-01
    modified2020-06-02
    plugin id78228
    published2014-10-10
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78228
    titleF5 Networks BIG-IP : BIND 9 vulnerability (SOL9754)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD2009-002.NASL
    descriptionThe remote host is running a version of Mac OS X 10.4 that does not have Security Update 2009-002 applied. This security update contains fixes for the following products : - Apache - ATS - BIND - CoreGraphics - Cscope - CUPS - Disk Images - enscript - Flash Player plug-in - Help Viewer - IPSec - Kerberos - Launch Services - libxml - Net-SNMP - Network Time - OpenSSL - QuickDraw Manager - Spotlight - system_cmds - telnet - Terminal - X11
    last seen2020-06-01
    modified2020-06-02
    plugin id38743
    published2009-05-13
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/38743
    titleMac OS X Multiple Vulnerabilities (Security Update 2009-002)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1701.NASL
    descriptionIt was discovered that OpenSSL does not properly verify DSA signatures on X.509 certificates due to an API misuse, potentially leading to the acceptance of incorrect X.509 certificates as genuine (CVE-2008-5077 ).
    last seen2020-06-01
    modified2020-06-02
    plugin id35364
    published2009-01-14
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35364
    titleDebian DSA-1701-1 : openssl, openssl097 - interpretation conflict
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_1_LIBOPENSSL-DEVEL-090121.NASL
    descriptionThis update improves the verification of return values. Prior to this udpate it was possible to bypass the certification chain checks of openssl. (CVE-2008-5077)
    last seen2020-06-01
    modified2020-06-02
    plugin id40259
    published2009-07-21
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40259
    titleopenSUSE Security Update : libopenssl-devel (libopenssl-devel-461)

Oval

  • accepted2009-11-30T04:00:36.828-05:00
    classvulnerability
    contributors
    • nameMichael Wood
      organizationHewlett-Packard
    • nameMichael Wood
      organizationHewlett-Packard
    definition_extensions
    • commentVMWare ESX Server 3.0.3 is installed
      ovaloval:org.mitre.oval:def:6026
    • commentVMWare ESX Server 3.0.2 is installed
      ovaloval:org.mitre.oval:def:5613
    • commentVMware ESX Server 3.5.0 is installed
      ovaloval:org.mitre.oval:def:5887
    descriptionOpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
    familyunix
    idoval:org.mitre.oval:def:6380
    statusaccepted
    submitted2009-09-23T15:39:02.000-04:00
    titleOpenSSL DSA and ECDSA "EVP_VerifyFinal()" Spoofing Vulnerability
    version3
  • accepted2013-04-29T04:18:21.379-04:00
    classvulnerability
    contributors
    • nameAharon Chernin
      organizationSCAP.com, LLC
    • nameDragos Prisaca
      organizationG2, Inc.
    definition_extensions
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
      ovaloval:org.mitre.oval:def:11782
    • commentCentOS Linux 3.x
      ovaloval:org.mitre.oval:def:16651
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
      ovaloval:org.mitre.oval:def:11831
    • commentCentOS Linux 4.x
      ovaloval:org.mitre.oval:def:16636
    • commentOracle Linux 4.x
      ovaloval:org.mitre.oval:def:15990
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 5
      ovaloval:org.mitre.oval:def:11414
    • commentThe operating system installed on the system is CentOS Linux 5.x
      ovaloval:org.mitre.oval:def:15802
    • commentOracle Linux 5.x
      ovaloval:org.mitre.oval:def:15459
    descriptionOpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
    familyunix
    idoval:org.mitre.oval:def:9155
    statusaccepted
    submitted2010-07-09T03:56:16-04:00
    titleOpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
    version28

Redhat

advisories
bugzilla
id476671
titleCVE-2008-5077 OpenSSL Incorrect checks for malformed signatures
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • OR
      • AND
        • commentopenssl-devel is earlier than 0:0.9.7a-43.17.el4_7.2
          ovaloval:com.redhat.rhsa:tst:20090004001
        • commentopenssl-devel is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060661006
      • AND
        • commentopenssl-perl is earlier than 0:0.9.7a-43.17.el4_7.2
          ovaloval:com.redhat.rhsa:tst:20090004003
        • commentopenssl-perl is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060661008
      • AND
        • commentopenssl is earlier than 0:0.9.7a-43.17.el4_7.2
          ovaloval:com.redhat.rhsa:tst:20090004005
        • commentopenssl is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060661004
      • AND
        • commentopenssl096b is earlier than 0:0.9.6b-22.46.el4_7
          ovaloval:com.redhat.rhsa:tst:20090004007
        • commentopenssl096b is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060661002
  • AND
    • commentRed Hat Enterprise Linux 5 is installed
      ovaloval:com.redhat.rhba:tst:20070331005
    • OR
      • AND
        • commentopenssl097a is earlier than 0:0.9.7a-9.el5_2.1
          ovaloval:com.redhat.rhsa:tst:20090004010
        • commentopenssl097a is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20090004011
      • AND
        • commentopenssl-devel is earlier than 0:0.9.8b-10.el5_2.1
          ovaloval:com.redhat.rhsa:tst:20090004012
        • commentopenssl-devel is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070964002
      • AND
        • commentopenssl-perl is earlier than 0:0.9.8b-10.el5_2.1
          ovaloval:com.redhat.rhsa:tst:20090004014
        • commentopenssl-perl is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070964006
      • AND
        • commentopenssl is earlier than 0:0.9.8b-10.el5_2.1
          ovaloval:com.redhat.rhsa:tst:20090004016
        • commentopenssl is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20070964004
rhsa
idRHSA-2009:0004
released2009-01-07
severityImportant
titleRHSA-2009:0004: openssl security update (Important)
rpms
  • openssl-0:0.9.6b-49
  • openssl-0:0.9.7a-33.25
  • openssl-0:0.9.7a-43.17.el4_7.2
  • openssl-0:0.9.8b-10.el5_2.1
  • openssl-debuginfo-0:0.9.7a-33.25
  • openssl-debuginfo-0:0.9.7a-43.17.el4_7.2
  • openssl-debuginfo-0:0.9.8b-10.el5_2.1
  • openssl-devel-0:0.9.6b-49
  • openssl-devel-0:0.9.7a-33.25
  • openssl-devel-0:0.9.7a-43.17.el4_7.2
  • openssl-devel-0:0.9.8b-10.el5_2.1
  • openssl-perl-0:0.9.6b-49
  • openssl-perl-0:0.9.7a-33.25
  • openssl-perl-0:0.9.7a-43.17.el4_7.2
  • openssl-perl-0:0.9.8b-10.el5_2.1
  • openssl095a-0:0.9.5a-34
  • openssl096-0:0.9.6-34
  • openssl096b-0:0.9.6b-16.49
  • openssl096b-0:0.9.6b-22.46.el4_7
  • openssl096b-debuginfo-0:0.9.6b-16.49
  • openssl096b-debuginfo-0:0.9.6b-22.46.el4_7
  • openssl097a-0:0.9.7a-9.el5_2.1
  • openssl097a-debuginfo-0:0.9.7a-9.el5_2.1

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 33150 CVE ID:CVE-2008-5077 CNCVE ID:CNCVE-20085077 OpenSSL是一款开放源码的SSL实现,用来实现网络通信的高强度加密。 部分OpenSSL函数验证DSA和ECDSA密钥时不正确验证&quot;EVP_VerifyFinal()&quot;函数返回值,发送特殊构建的签名证书链给客户端,可绕过签名检查。 通过恶意服务器或中间人攻击,可使证书链中的畸形SSL/TLS签名绕过客户端软件检查,导致盲目信任并泄漏敏感信息。 成功利用此漏洞需要服务器使用包含DSA或者ECDSA密钥的证书。 Ubuntu Ubuntu Linux 8.10 sparc Ubuntu Ubuntu Linux 8.10 powerpc Ubuntu Ubuntu Linux 8.10 lpia Ubuntu Ubuntu Linux 8.10 i386 Ubuntu Ubuntu Linux 8.10 amd64 Ubuntu Ubuntu Linux 8.04 LTS sparc Ubuntu Ubuntu Linux 8.04 LTS powerpc Ubuntu Ubuntu Linux 8.04 LTS lpia Ubuntu Ubuntu Linux 8.04 LTS i386 Ubuntu Ubuntu Linux 8.04 LTS amd64 Ubuntu Ubuntu Linux 7.10 sparc Ubuntu Ubuntu Linux 7.10 powerpc Ubuntu Ubuntu Linux 7.10 lpia Ubuntu Ubuntu Linux 7.10 i386 Ubuntu Ubuntu Linux 7.10 amd64 Ubuntu Ubuntu Linux 6.06 LTS sparc Ubuntu Ubuntu Linux 6.06 LTS powerpc Ubuntu Ubuntu Linux 6.06 LTS i386 Ubuntu Ubuntu Linux 6.06 LTS amd64 Sun Grid Engine 5.3 x86 Sun Grid Engine 5.3 Sun Linux Sun Grid Engine 5.3 64-bit SPARC Sun Grid Engine 5.3 32-bit SPARC Sun Grid Engine 5.3 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux WS 3 RedHat Enterprise Linux WS 2.1 IA64 RedHat Enterprise Linux WS 2.1 RedHat Enterprise Linux ES 4 RedHat Enterprise Linux ES 3 RedHat Enterprise Linux ES 2.1 IA64 RedHat Enterprise Linux ES 2.1 RedHat Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop 5 client RedHat Enterprise Linux AS 4 RedHat Enterprise Linux AS 3 RedHat Enterprise Linux AS 2.1 IA64 RedHat Enterprise Linux AS 2.1 RedHat Enterprise Linux 5 server RedHat Desktop 3.0 OpenSSL Project OpenSSL 0.9.8 i OpenSSL Project OpenSSL 0.9.8 e OpenSSL Project OpenSSL 0.9.8 d OpenSSL Project OpenSSL 0.9.8 c OpenSSL Project OpenSSL 0.9.8 b OpenSSL Project OpenSSL 0.9.8 a OpenSSL Project OpenSSL 0.9.8 + Gentoo Linux OpenSSL Project OpenSSL 0.9.7 m OpenSSL Project OpenSSL 0.9.7 l OpenSSL Project OpenSSL 0.9.7 k OpenSSL Project OpenSSL 0.9.7 j OpenSSL Project OpenSSL 0.9.7 i OpenSSL Project OpenSSL 0.9.7 h OpenSSL Project OpenSSL 0.9.7 g OpenSSL Project OpenSSL 0.9.7 f OpenSSL Project OpenSSL 0.9.7 e OpenSSL Project OpenSSL 0.9.7 d OpenSSL Project OpenSSL 0.9.7 c + OpenPKG OpenPKG 2.0 + Slackware Linux 9.1 + Slackware Linux 9.0 + Slackware Linux -current OpenSSL Project OpenSSL 0.9.7 beta3 OpenSSL Project OpenSSL 0.9.7 beta2 OpenSSL Project OpenSSL 0.9.7 beta1 OpenSSL Project OpenSSL 0.9.7 b + OpenPKG OpenPKG 1.3 OpenSSL Project OpenSSL 0.9.7 a + Conectiva Linux 9.0 + OpenPKG OpenPKG Current OpenSSL Project OpenSSL 0.9.7 OpenSSL Project OpenSSL 0.9.6 m OpenSSL Project OpenSSL 0.9.6 l OpenSSL Project OpenSSL 0.9.6 k OpenSSL Project OpenSSL 0.9.6 j OpenSSL Project OpenSSL 0.9.6 i OpenSSL Project OpenSSL 0.9.6 h OpenSSL Project OpenSSL 0.9.6 g + Conectiva Linux Enterprise Edition 1.0 + FreeBSD FreeBSD 4.7 -RELEASE + FreeBSD FreeBSD 4.7 + HP Apache-Based Web Server 2.0.43 .04 + HP Apache-Based Web Server 2.0.43 .00 + HP Webmin-Based Admin 1.0 .01 + Immunix Immunix OS 7+ + NetBSD NetBSD 1.6 + OpenPKG OpenPKG 1.1 OpenSSL Project OpenSSL 0.9.6 f OpenSSL Project OpenSSL 0.9.6 e + FreeBSD FreeBSD 4.6 -RELEASE + FreeBSD FreeBSD 4.6 OpenSSL Project OpenSSL 0.9.6 d + Slackware Linux 8.1 OpenSSL Project OpenSSL 0.9.6 c + Conectiva Linux 8.0 + Debian Linux 3.0 sparc + Debian Linux 3.0 s/390 + Debian Linux 3.0 ppc + Debian Linux 3.0 mipsel + Debian Linux 3.0 mips + Debian Linux 3.0 m68k + Debian Linux 3.0 ia-64 + Debian Linux 3.0 ia-32 + Debian Linux 3.0 hppa + Debian Linux 3.0 arm + Debian Linux 3.0 alpha + Debian Linux 3.0 + MandrakeSoft Linux Mandrake 8.2 + S.u.S.E. Linux 8.0 i386 + S.u.S.E. Linux 8.0 OpenSSL Project OpenSSL 0.9.6 b-36.8 OpenSSL Project OpenSSL 0.9.6 b + MandrakeSoft Linux Mandrake 8.1 ia64 + MandrakeSoft Linux Mandrake 8.1 + OpenBSD OpenBSD 3.1 + OpenBSD OpenBSD 3.0 + RedHat Enterprise Linux AS 2.1 IA64 + RedHat Enterprise Linux AS 2.1 + RedHat Enterprise Linux ES 2.1 IA64 + RedHat Enterprise Linux ES 2.1 + RedHat Enterprise Linux WS 2.1 IA64 + RedHat Enterprise Linux WS 2.1 + RedHat Linux 7.3 i386 + RedHat Linux 7.3 + RedHat Linux 7.2 ia64 + RedHat Linux 7.2 i686 + RedHat Linux 7.2 i386 + RedHat Linux 7.2 + RedHat Linux Advanced Work Station 2.1 + S.u.S.E. Linux 7.3 sparc + S.u.S.E. Linux 7.3 ppc + S.u.S.E. Linux 7.3 i386 + S.u.S.E. Linux Connectivity Server + S.u.S.E. Linux Database Server 0 + S.u.S.E. Linux Enterprise Server 7 + S.u.S.E. Linux Firewall on CD + S.u.S.E. Office Server + S.u.S.E. SuSE eMail Server III + Sun Linux 5.0.7 + Sun Linux 5.0.6 + Sun Linux 5.0.5 + Sun Linux 5.0.3 + Sun Linux 5.0 OpenSSL Project OpenSSL 0.9.6 a + Conectiva Linux 7.0 + NetBSD NetBSD 1.5.3 + NetBSD NetBSD 1.5.2 + NetBSD NetBSD 1.5.1 + NetBSD NetBSD 1.5 + S.u.S.E. Linux 7.2 i386 + S.u.S.E. Linux 7.1 sparc + S.u.S.E. Linux 7.1 ppc + S.u.S.E. Linux 7.1 alpha + S.u.S.E. Linux 7.1 OpenSSL Project OpenSSL 0.9.6 + Caldera OpenLinux Server 3.1.1 + Caldera OpenLinux Server 3.1 + Caldera OpenLinux Workstation 3.1.1 + Caldera OpenLinux Workstation 3.1 + Conectiva Linux 6.0 + EnGarde Secure Linux 1.0.1 + HP Secure OS software for Linux 1.0 + MandrakeSoft Linux Mandrake 8.0 ppc + MandrakeSoft Linux Mandrake 8.0 + NetBSD NetBSD 1.6 beta + NetBSD NetBSD 1.6 + NetBSD NetBSD 1.5.3 + NetBSD NetBSD 1.5.2 + NetBSD NetBSD 1.5.1 + NetBSD NetBSD 1.5 + OpenBSD OpenBSD 2.9 + OpenPKG OpenPKG 1.0 + RedHat Linux 7.3 i386 + RedHat Linux 7.3 + RedHat Linux 7.2 i386 + RedHat Linux 7.2 alpha + RedHat Linux 7.1 i386 + RedHat Linux 7.1 alpha + RedHat Linux 7.0 sparc + RedHat Linux 7.0 i386 + RedHat Linux 7.0 alpha + Trustix Secure Linux 1.5 + Trustix Secure Linux 1.2 + Trustix Secure Linux 1.1 OpenSSL Project OpenSSL 0.9.5 a + Debian Linux 3.0 + HP Secure OS software for Linux 1.0 + Immunix Immunix OS 7.0 + Immunix Immunix OS 6.2 + MandrakeSoft Corporate Server 1.0.1 + MandrakeSoft Linux Mandrake 7.2 + MandrakeSoft Linux Mandrake 7.1 + MandrakeSoft Single Network Firewall 7.2 + OpenBSD OpenBSD 2.8 + OpenBSD OpenBSD 2.7 + RedHat Linux 7.3 i386 + RedHat Linux 7.2 ia64 + RedHat Linux 7.2 i686 + RedHat Linux 7.2 i386 + RedHat Linux 7.2 alpha + RedHat Linux 7.2 + RedHat Linux 7.1 ia64 + RedHat Linux 7.1 i386 + RedHat Linux 7.1 alpha + RedHat Linux 7.1 + RedHat Linux 7.0 i386 + RedHat Linux 7.0 alpha + RedHat Linux 7.0 + RedHat Linux 6.2 sparc + RedHat Linux 6.2 i386 + RedHat Linux 6.2 alpha + RedHat Linux 6.2 + S.u.S.E. Linux 7.0 sparc + S.u.S.E. Linux 7.0 ppc + S.u.S.E. Linux 7.0 i386 + S.u.S.E. Linux 7.0 alpha OpenSSL Project OpenSSL 0.9.5 + RedHat Linux 6.2 sparc + RedHat Linux 6.2 i386 + RedHat Linux 6.2 alpha OpenSSL Project OpenSSL 0.9.4 OpenSSL Project OpenSSL 0.9.3 OpenSSL Project OpenSSL 0.9.2 b OpenSSL Project OpenSSL 0.9.1 c OpenSSL Project OpenSSL 0.9.8h OpenSSL Project OpenSSL 0.9.8g OpenSSL Project OpenSSL 0.9.8f OpenSSL Project OpenSSL 0.9.8 f NTP NTP 4.2.5 p150 NTP NTP 4.2.4 p5 Gale Gale 0.99 FreeBSD FreeBSD 7.1-STABLE FreeBSD FreeBSD 7.1 -RELEASE-p1 FreeBSD FreeBSD 7.1 -PRE-RELEASE FreeBSD FreeBSD 7.0-STABLE FreeBSD FreeBSD 7.0-RELEASE-p8 FreeBSD FreeBSD 7.0-RELEASE FreeBSD FreeBSD 7.0 BETA4 FreeBSD FreeBSD 7.0 -RELENG FreeBSD FreeBSD 7.0 -PRERELEASE FreeBSD FreeBSD 7.0 FreeBSD FreeBSD 6.4-RELEASE-p2 FreeBSD FreeBSD 6.4 -STABLE FreeBSD FreeBSD 6.4 -RELEASE FreeBSD FreeBSD 6.3 -RELENG FreeBSD FreeBSD 6.3 -RELEASE-p8 FreeBSD FreeBSD 6.3 -RELEASE-p6 FreeBSD FreeBSD 6.3 FreeBSD FreeBSD 6.2 -STABLE FreeBSD FreeBSD 6.2 -RELENG FreeBSD FreeBSD 6.2 不受影响系统 Sun Grid Engine 6.0 OpenSSL Project OpenSSL 0.9.8 j NTP NTP 4.2.5 p153 NTP NTP 4.2.4 p6 厂商解决方案 可参考如下补丁或升级程序: FreeBSD FreeBSD 6.3 FreeBSD openssl6.patch <a href=http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch</a> Ubuntu Ubuntu Linux 7.10 powerpc Ubuntu libcrypto0.9.8-udeb_0.9.8e-5ubuntu3.3_powerpc.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8e-5ubuntu3.3_powerpc.udeb Ubuntu libssl-dev_0.9.8e-5ubuntu3.3_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> e-5ubuntu3.3_powerpc.deb Ubuntu libssl0.9.8-dbg_0.9.8e-5ubuntu3.3_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8e-5ubuntu3.3_powerpc.deb Ubuntu libssl0.9.8_0.9.8e-5ubuntu3.3_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8e-5ubuntu3.3_powerpc.deb Ubuntu openssl_0.9.8e-5ubuntu3.3_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5</a> ubuntu3.3_powerpc.deb Ubuntu Ubuntu Linux 8.04 LTS powerpc Ubuntu libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.4_powerpc.udeb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g</a> -4ubuntu3.4_powerpc.udeb Ubuntu libssl-dev_0.9.8g-4ubuntu3.4_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3 target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3</a> .4_powerpc.deb Ubuntu libssl0.9.8-dbg_0.9.8g-4ubuntu3.4_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ub target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ub</a> untu3.4_powerpc.deb Ubuntu libssl0.9.8_0.9.8g-4ubuntu3.4_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu</a> 3.4_powerpc.deb Ubuntu openssl-doc_0.9.8g-4ubuntu3.4_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-4ubuntu3.4_all.deb Ubuntu openssl_0.9.8g-4ubuntu3.4_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.4_ target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.4_</a> powerpc.deb Ubuntu Ubuntu Linux 8.10 powerpc Ubuntu libcrypto0.9.8-udeb_0.9.8g-10.1ubuntu2.1_powerpc.udeb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g</a> -10.1ubuntu2.1_powerpc.udeb Ubuntu libssl-dev_0.9.8g-10.1ubuntu2.1_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-10.1ubun target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-10.1ubun</a> tu2.1_powerpc.deb Ubuntu libssl0.9.8-dbg_0.9.8g-10.1ubuntu2.1_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10. target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10.</a> 1ubuntu2.1_powerpc.deb Ubuntu libssl0.9.8_0.9.8g-10.1ubuntu2.1_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1ubu target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1ubu</a> ntu2.1_powerpc.deb Ubuntu openssl-doc_0.9.8g-10.1ubuntu2.1_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-10.1ubuntu2.1_all.deb Ubuntu openssl_0.9.8g-10.1ubuntu2.1_powerpc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-10.1ubuntu2 target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-10.1ubuntu2</a> .1_powerpc.deb Ubuntu Ubuntu Linux 8.04 LTS sparc Ubuntu libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.4_sparc.udeb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g</a> -4ubuntu3.4_sparc.udeb Ubuntu libssl-dev_0.9.8g-4ubuntu3.4_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3 target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3</a> .4_sparc.deb Ubuntu libssl0.9.8-dbg_0.9.8g-4ubuntu3.4_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ub target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ub</a> untu3.4_sparc.deb Ubuntu libssl0.9.8_0.9.8g-4ubuntu3.4_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu</a> 3.4_sparc.deb Ubuntu openssl-doc_0.9.8g-4ubuntu3.4_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-4ubuntu3.4_all.deb Ubuntu openssl_0.9.8g-4ubuntu3.4_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.4_ target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.4_</a> sparc.deb Ubuntu Ubuntu Linux 6.06 LTS sparc Ubuntu libcrypto0.9.8-udeb_0.9.8a-7ubuntu0.6_sparc.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8a-7ubuntu0.6_sparc.udeb Ubuntu libssl-dev_0.9.8a-7ubuntu0.6_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> a-7ubuntu0.6_sparc.deb Ubuntu libssl0.9.8-dbg_0.9.8a-7ubuntu0.6_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8a-7ubuntu0.6_sparc.deb Ubuntu libssl0.9.8_0.9.8a-7ubuntu0.6_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8a-7ubuntu0.6_sparc.deb Ubuntu openssl_0.9.8a-7ubuntu0.6_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8a-7 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8a-7</a> ubuntu0.6_sparc.deb OpenSSL Project OpenSSL 0.9.8g OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> Ubuntu Ubuntu Linux 8.04 LTS amd64 Ubuntu libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.4_amd64.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8g-4ubuntu3.4_amd64.udeb Ubuntu libssl-dev_0.9.8g-4ubuntu3.4_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> g-4ubuntu3.4_amd64.deb Ubuntu libssl0.9.8-dbg_0.9.8g-4ubuntu3.4_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8g-4ubuntu3.4_amd64.deb Ubuntu libssl0.9.8_0.9.8g-4ubuntu3.4_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8g-4ubuntu3.4_amd64.deb Ubuntu openssl-doc_0.9.8g-4ubuntu3.4_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-4ubuntu3.4_all.deb Ubuntu openssl_0.9.8g-4ubuntu3.4_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4</a> ubuntu3.4_amd64.deb FreeBSD FreeBSD 7.0-RELEASE FreeBSD openssl.patch <a href=http://security.FreeBSD.org/patches/SA-09:02/openssl.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl.patch</a> Ubuntu Ubuntu Linux 7.10 sparc Ubuntu libcrypto0.9.8-udeb_0.9.8e-5ubuntu3.3_sparc.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8e-5ubuntu3.3_sparc.udeb Ubuntu libssl-dev_0.9.8e-5ubuntu3.3_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> e-5ubuntu3.3_sparc.deb Ubuntu libssl0.9.8-dbg_0.9.8e-5ubuntu3.3_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8e-5ubuntu3.3_sparc.deb Ubuntu libssl0.9.8_0.9.8e-5ubuntu3.3_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8e-5ubuntu3.3_sparc.deb Ubuntu openssl_0.9.8e-5ubuntu3.3_sparc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5</a> ubuntu3.3_sparc.deb FreeBSD FreeBSD 6.4 -STABLE FreeBSD openssl6.patch <a href=http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch</a> Ubuntu Ubuntu Linux 8.10 sparc Ubuntu libcrypto0.9.8-udeb_0.9.8g-10.1ubuntu2.1_sparc.udeb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g</a> -10.1ubuntu2.1_sparc.udeb Ubuntu libssl-dev_0.9.8g-10.1ubuntu2.1_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-10.1ubun target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-10.1ubun</a> tu2.1_sparc.deb Ubuntu libssl0.9.8-dbg_0.9.8g-10.1ubuntu2.1_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10. target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10.</a> 1ubuntu2.1_sparc.deb Ubuntu libssl0.9.8_0.9.8g-10.1ubuntu2.1_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1ubu target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1ubu</a> ntu2.1_sparc.deb Ubuntu openssl-doc_0.9.8g-10.1ubuntu2.1_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-10.1ubuntu2.1_all.deb Ubuntu openssl_0.9.8g-10.1ubuntu2.1_sparc.deb <a href=http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-10.1ubuntu2 target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-10.1ubuntu2</a> .1_sparc.deb FreeBSD FreeBSD 7.1-STABLE FreeBSD openssl.patch <a href=http://security.FreeBSD.org/patches/SA-09:02/openssl.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl.patch</a> FreeBSD FreeBSD 6.3 -RELENG FreeBSD openssl6.patch <a href=http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch</a> OpenSSL Project OpenSSL 0.9.8h OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> Ubuntu Ubuntu Linux 8.10 amd64 Ubuntu libcrypto0.9.8-udeb_0.9.8g-10.1ubuntu2.1_amd64.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8g-10.1ubuntu2.1_amd64.udeb Ubuntu libssl-dev_0.9.8g-10.1ubuntu2.1_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> g-10.1ubuntu2.1_amd64.deb Ubuntu libssl0.9.8-dbg_0.9.8g-10.1ubuntu2.1_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8g-10.1ubuntu2.1_amd64.deb Ubuntu libssl0.9.8_0.9.8g-10.1ubuntu2.1_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8g-10.1ubuntu2.1_amd64.deb Ubuntu openssl-doc_0.9.8g-10.1ubuntu2.1_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-10.1ubuntu2.1_all.deb Ubuntu openssl_0.9.8g-10.1ubuntu2.1_amd64.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-1 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-1</a> 0.1ubuntu2.1_amd64.deb OpenSSL Project OpenSSL 0.9.8f OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> Ubuntu Ubuntu Linux 8.10 i386 Ubuntu libcrypto0.9.8-udeb_0.9.8g-10.1ubuntu2.1_i386.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8g-10.1ubuntu2.1_i386.udeb Ubuntu libssl-dev_0.9.8g-10.1ubuntu2.1_i386.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> g-10.1ubuntu2.1_i386.deb Ubuntu libssl0.9.8-dbg_0.9.8g-10.1ubuntu2.1_i386.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8g-10.1ubuntu2.1_i386.deb Ubuntu libssl0.9.8_0.9.8g-10.1ubuntu2.1_i386.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8g-10.1ubuntu2.1_i386.deb Ubuntu openssl-doc_0.9.8g-10.1ubuntu2.1_all.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-10.1ubuntu2.1_all.deb Ubuntu openssl_0.9.8g-10.1ubuntu2.1_i386.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-1 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-1</a> 0.1ubuntu2.1_i386.deb OpenSSL Project OpenSSL 0.9.8 f OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> Ubuntu Ubuntu Linux 6.06 LTS powerpc Ubuntu libcrypto0.9.8-udeb_0.9.8a-7ubuntu0.6_powerpc.udeb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8a-7ubuntu0.6_powerpc.udeb Ubuntu libssl-dev_0.9.8a-7ubuntu0.6_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> a-7ubuntu0.6_powerpc.deb Ubuntu libssl0.9.8-dbg_0.9.8a-7ubuntu0.6_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8a-7ubuntu0.6_powerpc.deb Ubuntu libssl0.9.8_0.9.8a-7ubuntu0.6_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8a-7ubuntu0.6_powerpc.deb Ubuntu openssl_0.9.8a-7ubuntu0.6_powerpc.deb <a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8a-7 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8a-7</a> ubuntu0.6_powerpc.deb OpenSSL Project OpenSSL 0.9.1 c OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.2 b OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.3 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.5 a OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.5 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 j OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 d OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 c OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 b-36.8 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 e OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 h OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 a OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 f OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 b OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.6 g OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 f OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 i OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 m OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 c OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 beta2 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 beta1 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 j OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 a OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 l OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 e OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 h OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 g OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 beta3 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 b OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.7 k OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.8 a OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.8 i OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.8 c OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.8 b OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a> OpenSSL Project OpenSSL 0.9.8 OpenSSL Project openssl-0.9.8j.tar.gz <a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>
idSSV:4636
last seen2017-11-19
modified2009-01-08
published2009-01-08
reporterRoot
titleOpenSSL 'EVP_VerifyFinal'函数签名验证漏洞

References