Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-3738

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-28 Sep, 2006 | 18:00
Updated At-07 Aug, 2024 | 18:39
Rejected At-
Credits

Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:28 Sep, 2006 | 18:00
Updated At:07 Aug, 2024 | 18:39
Rejected At:
▼CVE Numbering Authority (CNA)

Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:172
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/22212
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4750
vdb-entry
x_refsource_VUPEN
http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
x_refsource_CONFIRM
http://secunia.com/advisories/23915
third-party-advisory
x_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
vendor-advisory
x_refsource_HP
http://securitytracker.com/id?1016943
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/23038
third-party-advisory
x_refsource_SECUNIA
http://www.trustix.org/errata/2006/0054
vendor-advisory
x_refsource_TRUSTIX
http://www.debian.org/security/2006/dsa-1195
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/23309
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/4401
vdb-entry
x_refsource_VUPEN
http://www.ubuntu.com/usn/usn-353-1
vendor-advisory
x_refsource_UBUNTU
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
x_refsource_CONFIRM
http://secunia.com/advisories/22116
third-party-advisory
x_refsource_SECUNIA
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml
vendor-advisory
x_refsource_GENTOO
http://www.kb.cert.org/vuls/id/547300
third-party-advisory
x_refsource_CERT-VN
http://secunia.com/advisories/22166
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-0695.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/23340
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4314
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22385
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_24_sr.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/22758
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22487
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_58_openssl.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/22772
third-party-advisory
x_refsource_SECUNIA
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/22165
third-party-advisory
x_refsource_SECUNIA
http://docs.info.apple.com/article.html?artnum=304829
x_refsource_CONFIRM
http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html
mailing-list
x_refsource_FULLDISC
http://secunia.com/advisories/23794
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=130497311408250&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/22220
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
http://openvpn.net/changelog.html
x_refsource_CONFIRM
http://secunia.com/advisories/25889
third-party-advisory
x_refsource_SECUNIA
http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/4036
vdb-entry
x_refsource_VUPEN
http://openbsd.org/errata.html#openssl2
vendor-advisory
x_refsource_OPENBSD
http://secunia.com/advisories/30124
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22626
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/22083
vdb-entry
x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
vendor-advisory
x_refsource_MANDRIVA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370
vdb-entry
signature
x_refsource_OVAL
http://www.vupen.com/english/advisories/2006/3869
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22544
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22298
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22130
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31492
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22284
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/24930
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0629.html
vendor-advisory
x_refsource_REDHAT
http://security.gentoo.org/glsa/glsa-200610-11.xml
vendor-advisory
x_refsource_GENTOO
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256
vdb-entry
signature
x_refsource_OVAL
http://issues.rpath.com/browse/RPL-613
x_refsource_CONFIRM
http://secunia.com/advisories/26329
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22260
third-party-advisory
x_refsource_SECUNIA
http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf
x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/29237
vdb-entry
x_refsource_XF
http://www.vupen.com/english/advisories/2007/0343
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/3860
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/23280
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/447318/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/4264
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22193
third-party-advisory
x_refsource_SECUNIA
http://www.osvdb.org/29262
vdb-entry
x_refsource_OSVDB
http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
x_refsource_CONFIRM
http://secunia.com/advisories/23155
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22799
third-party-advisory
x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946
vendor-advisory
x_refsource_SLACKWARE
http://www.vupen.com/english/advisories/2006/4417
vdb-entry
x_refsource_VUPEN
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=130497311408250&w=2
vendor-advisory
x_refsource_HP
http://www.serv-u.com/releasenotes/
x_refsource_CONFIRM
http://www.securityfocus.com/bid/20249
vdb-entry
x_refsource_BID
http://www.vupen.com/english/advisories/2006/4443
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/30161
third-party-advisory
x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
x_refsource_CONFIRM
http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/22094
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22186
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22633
third-party-advisory
x_refsource_SECUNIA
http://www.openssl.org/news/secadv_20060928.txt
x_refsource_CONFIRM
http://kolab.org/security/kolab-vendor-notice-11.txt
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/2315
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22500
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
vendor-advisory
x_refsource_APPLE
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
third-party-advisory
x_refsource_CERT
http://secunia.com/advisories/22216
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3820
vdb-entry
x_refsource_VUPEN
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
vendor-advisory
x_refsource_HP
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html
vendor-advisory
x_refsource_OPENPKG
http://secunia.com/advisories/22654
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1401
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1
vendor-advisory
x_refsource_SUNALERT
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc
vendor-advisory
x_refsource_NETBSD
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
vendor-advisory
x_refsource_HP
http://www.securityfocus.com/archive/1/456546/100/200/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/447393/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/3936
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22240
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22330
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://www.debian.org/security/2006/dsa-1185
vendor-advisory
x_refsource_DEBIAN
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
vendor-advisory
x_refsource_SGI
http://secunia.com/advisories/22207
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
vendor-advisory
x_refsource_MANDRIVA
http://securitytracker.com/id?1017522
vdb-entry
x_refsource_SECTRACK
http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
vendor-advisory
x_refsource_CISCO
http://www.vupen.com/english/advisories/2006/3902
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/2783
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/archive/1/470460/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/22259
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22460
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22791
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22172
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
x_refsource_CONFIRM
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
vendor-advisory
x_refsource_HP
http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc
vendor-advisory
x_refsource_FREEBSD
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1
vendor-advisory
x_refsource_SUNALERT
http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
vendor-advisory
x_refsource_CISCO
http://secunia.com/advisories/24950
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:172
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/22212
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/23915
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://securitytracker.com/id?1016943
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/23038
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.trustix.org/errata/2006/0054
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://www.debian.org/security/2006/dsa-1195
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/23309
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/4401
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ubuntu.com/usn/usn-353-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22116
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.kb.cert.org/vuls/id/547300
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://secunia.com/advisories/22166
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0695.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/23340
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/4314
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22385
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/linux/security/advisories/2006_24_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/22758
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22487
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/linux/security/advisories/2006_58_openssl.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/22772
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/22165
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://secunia.com/advisories/23794
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/22220
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://openvpn.net/changelog.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/25889
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/4036
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://openbsd.org/errata.html#openssl2
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://secunia.com/advisories/30124
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22626
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/22083
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.vupen.com/english/advisories/2006/3869
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22544
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22298
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22130
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31492
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22284
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/24930
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://security.gentoo.org/glsa/glsa-200610-11.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://issues.rpath.com/browse/RPL-613
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/26329
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22260
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29237
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.vupen.com/english/advisories/2007/0343
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2006/3860
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/23280
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/447318/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/4264
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22193
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.osvdb.org/29262
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/23155
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22799
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://www.vupen.com/english/advisories/2006/4417
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.serv-u.com/releasenotes/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/20249
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.vupen.com/english/advisories/2006/4443
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/30161
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/22094
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22186
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22633
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.openssl.org/news/secadv_20060928.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://kolab.org/security/kolab-vendor-notice-11.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2007/2315
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22500
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://secunia.com/advisories/22216
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/3820
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html
Resource:
vendor-advisory
x_refsource_OPENPKG
Hyperlink: http://secunia.com/advisories/22654
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.securityfocus.com/archive/1/447393/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.vupen.com/english/advisories/2006/3936
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22240
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22330
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.debian.org/security/2006/dsa-1185
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
Hyperlink: http://secunia.com/advisories/22207
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://securitytracker.com/id?1017522
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://www.vupen.com/english/advisories/2006/3902
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2007/2783
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/archive/1/470460/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/22259
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22460
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22791
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22172
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://secunia.com/advisories/24950
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1
Resource:
vendor-advisory
x_refsource_SUNALERT
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:172
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/22212
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/4750
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/23915
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
vendor-advisory
x_refsource_HP
x_transferred
http://securitytracker.com/id?1016943
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/23038
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.trustix.org/errata/2006/0054
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://www.debian.org/security/2006/dsa-1195
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/23309
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/4401
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ubuntu.com/usn/usn-353-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22116
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
x_refsource_CONFIRM
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.kb.cert.org/vuls/id/547300
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://secunia.com/advisories/22166
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0695.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/23340
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/4314
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22385
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/linux/security/advisories/2006_24_sr.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/22758
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22487
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/linux/security/advisories/2006_58_openssl.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/22772
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/22165
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://docs.info.apple.com/article.html?artnum=304829
x_refsource_CONFIRM
x_transferred
http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://secunia.com/advisories/23794
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=130497311408250&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/22220
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://openvpn.net/changelog.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/25889
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/4036
vdb-entry
x_refsource_VUPEN
x_transferred
http://openbsd.org/errata.html#openssl2
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://secunia.com/advisories/30124
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22626
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/22083
vdb-entry
x_refsource_BID
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
vendor-advisory
x_refsource_MANDRIVA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.vupen.com/english/advisories/2006/3869
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22544
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22298
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22130
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31492
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22284
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/24930
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0629.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://security.gentoo.org/glsa/glsa-200610-11.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://issues.rpath.com/browse/RPL-613
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/26329
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22260
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf
x_refsource_CONFIRM
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/29237
vdb-entry
x_refsource_XF
x_transferred
http://www.vupen.com/english/advisories/2007/0343
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2006/3860
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/23280
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/447318/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/4264
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22193
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.osvdb.org/29262
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/23155
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22799
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://www.vupen.com/english/advisories/2006/4417
vdb-entry
x_refsource_VUPEN
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=130497311408250&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.serv-u.com/releasenotes/
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/20249
vdb-entry
x_refsource_BID
x_transferred
http://www.vupen.com/english/advisories/2006/4443
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/30161
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
x_refsource_CONFIRM
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/22094
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22186
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22633
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.openssl.org/news/secadv_20060928.txt
x_refsource_CONFIRM
x_transferred
http://kolab.org/security/kolab-vendor-notice-11.txt
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2007/2315
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22500
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://secunia.com/advisories/22216
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/3820
vdb-entry
x_refsource_VUPEN
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
vendor-advisory
x_refsource_HP
x_transferred
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html
vendor-advisory
x_refsource_OPENPKG
x_transferred
http://secunia.com/advisories/22654
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/1401
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc
vendor-advisory
x_refsource_NETBSD
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
vendor-advisory
x_refsource_HP
x_transferred
http://www.securityfocus.com/archive/1/456546/100/200/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.securityfocus.com/archive/1/447393/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.vupen.com/english/advisories/2006/3936
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22240
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22330
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://www.debian.org/security/2006/dsa-1185
vendor-advisory
x_refsource_DEBIAN
x_transferred
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
vendor-advisory
x_refsource_SGI
x_transferred
http://secunia.com/advisories/22207
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://securitytracker.com/id?1017522
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
vendor-advisory
x_refsource_CISCO
x_transferred
http://www.vupen.com/english/advisories/2006/3902
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2007/2783
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/archive/1/470460/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/22259
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22460
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22791
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22172
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
x_refsource_CONFIRM
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
vendor-advisory
x_refsource_HP
x_transferred
http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
vendor-advisory
x_refsource_CISCO
x_transferred
http://secunia.com/advisories/24950
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:172
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/22212
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/23915
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://securitytracker.com/id?1016943
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/23038
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.trustix.org/errata/2006/0054
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1195
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/23309
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4401
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-353-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22116
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/547300
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://secunia.com/advisories/22166
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0695.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/23340
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4314
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22385
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_24_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/22758
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22487
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_58_openssl.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/22772
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/22165
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://secunia.com/advisories/23794
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/22220
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://openvpn.net/changelog.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/25889
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4036
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://openbsd.org/errata.html#openssl2
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://secunia.com/advisories/30124
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22626
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/22083
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3869
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22544
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22298
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22130
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31492
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22284
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/24930
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200610-11.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://issues.rpath.com/browse/RPL-613
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/26329
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22260
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29237
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/0343
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3860
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/23280
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/447318/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4264
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22193
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.osvdb.org/29262
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/23155
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22799
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4417
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.serv-u.com/releasenotes/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/20249
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4443
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/30161
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/22094
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22186
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22633
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.openssl.org/news/secadv_20060928.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://kolab.org/security/kolab-vendor-notice-11.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2315
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22500
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://secunia.com/advisories/22216
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3820
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html
Resource:
vendor-advisory
x_refsource_OPENPKG
x_transferred
Hyperlink: http://secunia.com/advisories/22654
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/447393/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3936
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22240
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22330
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1185
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
x_transferred
Hyperlink: http://secunia.com/advisories/22207
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://securitytracker.com/id?1017522
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3902
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2783
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/470460/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/22259
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22460
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22791
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22172
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://secunia.com/advisories/24950
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:28 Sep, 2006 | 18:07
Updated At:17 Oct, 2018 | 21:29

Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

OpenSSL
openssl
>>openssl>>0.9.7
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7a
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7b
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7c
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7d
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7e
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7f
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7g
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7h
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7i
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7j
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7k
cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.8
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.8a
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.8b
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.8c
cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
CWE ID: CWE-119
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Failed exploit attempts may crash applications, denying service to legitimate users.

Vendor Statements

Organization : Red Hat
Last Modified : 2007-03-14T00:00:00

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References
HyperlinkSourceResource
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.ascsecalert@redhat.com
N/A
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.ascsecalert@redhat.com
N/A
http://docs.info.apple.com/article.html?artnum=304829secalert@redhat.com
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771secalert@redhat.com
N/A
http://issues.rpath.com/browse/RPL-613secalert@redhat.com
N/A
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100secalert@redhat.com
N/A
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540secalert@redhat.com
N/A
http://kolab.org/security/kolab-vendor-notice-11.txtsecalert@redhat.com
Patch
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.htmlsecalert@redhat.com
N/A
http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.htmlsecalert@redhat.com
Patch
http://marc.info/?l=bugtraq&m=130497311408250&w=2secalert@redhat.com
N/A
http://openbsd.org/errata.html#openssl2secalert@redhat.com
Patch
http://openvpn.net/changelog.htmlsecalert@redhat.com
Patch
http://secunia.com/advisories/22094secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22116secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22130secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22165secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22166secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22172secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22186secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22193secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22207secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22212secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22216secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22220secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22240secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22259secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22260secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22284secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22298secalert@redhat.com
N/A
http://secunia.com/advisories/22330secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/22385secalert@redhat.com
N/A
http://secunia.com/advisories/22460secalert@redhat.com
N/A
http://secunia.com/advisories/22487secalert@redhat.com
N/A
http://secunia.com/advisories/22500secalert@redhat.com
N/A
http://secunia.com/advisories/22544secalert@redhat.com
N/A
http://secunia.com/advisories/22626secalert@redhat.com
N/A
http://secunia.com/advisories/22633secalert@redhat.com
N/A
http://secunia.com/advisories/22654secalert@redhat.com
N/A
http://secunia.com/advisories/22758secalert@redhat.com
N/A
http://secunia.com/advisories/22772secalert@redhat.com
N/A
http://secunia.com/advisories/22791secalert@redhat.com
N/A
http://secunia.com/advisories/22799secalert@redhat.com
N/A
http://secunia.com/advisories/23038secalert@redhat.com
N/A
http://secunia.com/advisories/23155secalert@redhat.com
N/A
http://secunia.com/advisories/23280secalert@redhat.com
N/A
http://secunia.com/advisories/23309secalert@redhat.com
N/A
http://secunia.com/advisories/23340secalert@redhat.com
N/A
http://secunia.com/advisories/23680secalert@redhat.com
N/A
http://secunia.com/advisories/23794secalert@redhat.com
N/A
http://secunia.com/advisories/23915secalert@redhat.com
N/A
http://secunia.com/advisories/24930secalert@redhat.com
N/A
http://secunia.com/advisories/24950secalert@redhat.com
N/A
http://secunia.com/advisories/25889secalert@redhat.com
N/A
http://secunia.com/advisories/26329secalert@redhat.com
N/A
http://secunia.com/advisories/30124secalert@redhat.com
N/A
http://secunia.com/advisories/30161secalert@redhat.com
N/A
http://secunia.com/advisories/31492secalert@redhat.com
N/A
http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.ascsecalert@redhat.com
Patch
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200610-11.xmlsecalert@redhat.com
N/A
http://securitytracker.com/id?1016943secalert@redhat.com
Patch
http://securitytracker.com/id?1017522secalert@redhat.com
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946secalert@redhat.com
Patch
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1secalert@redhat.com
Patch
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1secalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-220.htmsecalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-260.htmsecalert@redhat.com
N/A
http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.htmlsecalert@redhat.com
N/A
http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtmlsecalert@redhat.com
N/A
http://www.debian.org/security/2006/dsa-1185secalert@redhat.com
Patch
http://www.debian.org/security/2006/dsa-1195secalert@redhat.com
Patch
Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200612-11.xmlsecalert@redhat.com
N/A
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xmlsecalert@redhat.com
N/A
http://www.kb.cert.org/vuls/id/547300secalert@redhat.com
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:172secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:177secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:178secalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_24_sr.htmlsecalert@redhat.com
Patch
Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_58_openssl.htmlsecalert@redhat.com
Patch
Vendor Advisory
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.htmlsecalert@redhat.com
Patch
Vendor Advisory
http://www.openssl.org/news/secadv_20060928.txtsecalert@redhat.com
N/A
http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.htmlsecalert@redhat.com
N/A
http://www.osvdb.org/29262secalert@redhat.com
Patch
http://www.redhat.com/support/errata/RHSA-2006-0695.htmlsecalert@redhat.com
Patch
http://www.redhat.com/support/errata/RHSA-2008-0629.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/447318/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/447393/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/456546/100/200/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/470460/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/20249secalert@redhat.com
Patch
http://www.securityfocus.com/bid/22083secalert@redhat.com
N/A
http://www.serv-u.com/releasenotes/secalert@redhat.com
N/A
http://www.trustix.org/errata/2006/0054secalert@redhat.com
Patch
http://www.ubuntu.com/usn/usn-353-1secalert@redhat.com
Patch
http://www.us-cert.gov/cas/techalerts/TA06-333A.htmlsecalert@redhat.com
US Government Resource
http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.htmlsecalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3820secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3860secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3869secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3902secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3936secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4036secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4264secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4314secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4401secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4417secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4443secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4750secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/0343secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/1401secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2315secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2783secalert@redhat.com
N/A
http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdfsecalert@redhat.com
N/A
http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/29237secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370secalert@redhat.com
N/A
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144secalert@redhat.com
N/A
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://issues.rpath.com/browse/RPL-613
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://kolab.org/security/kolab-vendor-notice-11.txt
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://openbsd.org/errata.html#openssl2
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://openvpn.net/changelog.html
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://secunia.com/advisories/22094
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22116
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22130
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22165
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22166
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22172
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22186
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22193
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22207
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22212
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22216
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22220
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22240
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22259
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22260
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22284
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22298
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22330
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22385
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22460
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22487
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22500
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22544
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22626
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22633
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22654
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22758
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22772
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22791
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22799
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23038
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23155
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23280
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23309
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23340
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23680
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23794
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23915
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24930
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24950
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25889
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/26329
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30124
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30161
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/31492
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-200610-11.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securitytracker.com/id?1016943
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://securitytracker.com/id?1017522
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2006/dsa-1185
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.debian.org/security/2006/dsa-1195
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.kb.cert.org/vuls/id/547300
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:172
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_24_sr.html
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.novell.com/linux/security/advisories/2006_58_openssl.html
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.openssl.org/news/secadv_20060928.txt
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.osvdb.org/29262
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0695.html
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/447318/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/447393/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/470460/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/20249
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.securityfocus.com/bid/22083
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.serv-u.com/releasenotes/
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.trustix.org/errata/2006/0054
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.ubuntu.com/usn/usn-353-1
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3820
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3860
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3869
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3902
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3936
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4036
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4264
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4314
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4401
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4417
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4443
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/0343
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2315
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2783
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29237
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1647Records found

CVE-2016-2842
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-77.28% / 98.93%
||
7 Day CHG~0.00%
Published-03 Mar, 2016 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain memory allocation succeeds, which allows remote attackers to cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-0799.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-2108
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-65.50% / 98.43%
||
7 Day CHG~0.00%
Published-05 May, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCOpenSSL
Product-enterprise_linux_serverenterprise_linux_server_ausenterprise_linux_hpc_nodeenterprise_linux_hpc_node_eusenterprise_linux_desktopenterprise_linux_server_eusenterprise_linux_workstationopensslandroidn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-0799
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-53.85% / 97.91%
||
7 Day CHG~0.00%
Published-03 Mar, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.

Action-Not Available
Vendor-n/aPulse SecureOpenSSL
Product-steel_belted_radiusopensslclientn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-0705
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-39.01% / 97.17%
||
7 Day CHG-5.32%
Published-03 Mar, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.

Action-Not Available
Vendor-n/aGoogle LLCOpenSSLDebian GNU/LinuxOracle CorporationCanonical Ltd.
Product-mysqlubuntu_linuxopenssldebian_linuxandroidn/a
CVE-2022-2274
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-56.50% / 98.03%
||
7 Day CHG~0.00%
Published-01 Jul, 2022 | 07:30
Updated-17 Sep, 2024 | 00:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RSA implementation bug in AVX512IFMA instructions

The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.

Action-Not Available
Vendor-OpenSSLNetApp, Inc.
Product-opensslh500sh410s_firmwareh700s_firmwareh410c_firmwareh300s_firmwareh500s_firmwareh410sh410ch300sh700ssnapcenterOpenSSL
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-2068
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-69.30% / 98.58%
||
7 Day CHG~0.00%
Published-21 Jun, 2022 | 14:45
Updated-05 May, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The c_rehash script allows command injection

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

Action-Not Available
Vendor-OpenSSLSiemens AGBroadcom Inc.NetApp, Inc.Debian GNU/LinuxFedora Project
Product-h410saff_8700_firmwarefas_8300_firmwaredebian_linuxh500s_firmwareaff_a400h610ssinec_insbootstrap_osh410c_firmwaresannavh410csantricity_smi-s_provideropensslh700sh500sfas_8700_firmwareaff_8700h610contap_select_deploy_administration_utilityh615c_firmwareaff_a400_firmwarehci_management_nodeaff_8300fas_a400h610c_firmwarehci_compute_nodeh700s_firmwaresmi-s_providerfedorasolidfirefas_8700h410s_firmwaresnapmanagerh615ch300s_firmwarefas_8300element_softwareh610s_firmwarefas_a400_firmwareaff_8300_firmwareh300sontap_antivirus_connectorOpenSSL
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-1292
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-49.69% / 97.73%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 15:15
Updated-13 Aug, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The c_rehash script allows command injection

The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).

Action-Not Available
Vendor-Oracle CorporationFedora ProjectDebian GNU/LinuxOpenSSLSiemens AGNetApp, Inc.
Product-clustered_data_ontapopensslsolidfire_\&_hci_management_nodemysql_workbenchenterprise_manager_ops_centera700s_firmwaresolidfire\,_enterprise_sds_\&_hci_storage_nodeaff_500f_firmwarebrownfield_connectivity_gatewayh300e_firmwarefas_8300_firmwareaff_500ffedoraa250_firmwareh700eh500e_firmwarea250snapcenteraff_a400active_iq_unified_manageraff_8700fabric-attached_storage_a400_firmwaredebian_linuxh300ea700sfas_500f_firmwarefas_8700aff_8300h300s_firmwareaff_a400_firmwarefabric-attached_storage_a400oncommand_insightfas_8300fas_8700_firmwarefas_500fh410s_firmwaresnapmanagerh300sh700e_firmwareaff_8700_firmwareclustered_data_ontap_antivirus_connectorsantricity_smi-s_providerh700saff_8300_firmwareh500eh700s_firmwareoncommand_workflow_automationh410sh500s_firmwaresmi-s_providerh500smysql_serverOpenSSL
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2003-0545
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-71.74% / 98.67%
||
7 Day CHG~0.00%
Published-01 Oct, 2003 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Double free vulnerability in OpenSSL 0.9.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an SSL client certificate with a certain invalid ASN.1 encoding.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-415
Double Free
CVE-2016-6309
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-44.97% / 97.50%
||
7 Day CHG~0.00%
Published-26 Sep, 2016 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

statem/statem.c in OpenSSL 1.1.0a does not consider memory-block movement after a realloc call, which allows remote attackers to cause a denial of service (use-after-free) or possibly execute arbitrary code via a crafted TLS session.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-416
Use After Free
CVE-2009-3245
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-16.75% / 94.68%
||
7 Day CHG~0.00%
Published-05 Mar, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2014-3512
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-66.93% / 98.49%
||
7 Day CHG~0.00%
Published-13 Aug, 2014 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-0590
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-11.38% / 93.29%
||
7 Day CHG~0.00%
Published-27 Mar, 2009 | 16:00
Updated-07 Aug, 2024 | 04:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.

Action-Not Available
Vendor-n/aOpenSSLDebian GNU/Linux
Product-debian_linuxopenssln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-0292
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-6.38% / 90.62%
||
7 Day CHG~0.00%
Published-19 Mar, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-3735
Matching Score-6
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-6
Assigner-OpenSSL Software Foundation
CVSS Score-5.3||MEDIUM
EPSS-26.74% / 96.16%
||
7 Day CHG~0.00%
Published-28 Aug, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

Action-Not Available
Vendor-OpenSSLDebian GNU/Linux
Product-openssldebian_linuxOpenSSL
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-2176
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-8.2||HIGH
EPSS-10.16% / 92.82%
||
7 Day CHG~0.00%
Published-05 May, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2012-2110
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-5.89% / 90.24%
||
7 Day CHG~0.00%
Published-19 Apr, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.

Action-Not Available
Vendor-n/aOpenSSLRed Hat, Inc.
Product-openssln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2009-1377
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-3.51% / 87.15%
||
7 Day CHG~0.00%
Published-19 May, 2009 | 19:00
Updated-07 Aug, 2024 | 05:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-1789
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-4.53% / 88.73%
||
7 Day CHG~0.00%
Published-12 Jun, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.

Action-Not Available
Vendor-n/aOracle CorporationOpenSSL
Product-opensslsparc-opl_service_processorn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-0206
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-17.30% / 94.79%
||
7 Day CHG~0.00%
Published-09 Jan, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2014-8176
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-18.65% / 95.02%
||
7 Day CHG~0.00%
Published-12 Jun, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1918
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-10||HIGH
EPSS-0.91% / 74.95%
||
7 Day CHG~0.00%
Published-02 Nov, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the Data Archiver service in GE Intelligent Platforms Proficy Historian before 3.5 SIM 17 and 4.x before 4.0 SIM 12 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted TCP message traffic.

Action-Not Available
Vendor-gen/a
Product-intelligent_platforms_proficy_historiann/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0916
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-10.61% / 92.99%
||
7 Day CHG~0.00%
Published-08 Feb, 2011 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the SMTP service in IBM Lotus Domino allows remote attackers to execute arbitrary code via long arguments in a filename parameter in a malformed MIME e-mail message, aka SPR KLYH889M8H.

Action-Not Available
Vendor-n/aIBM Corporation
Product-lotus_dominon/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-1076
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-9.8||CRITICAL
EPSS-5.72% / 90.09%
||
7 Day CHG~0.00%
Published-11 May, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105.

Action-Not Available
Vendor-n/aApple Inc.Adobe Inc.Microsoft Corporation
Product-acrobat_reader_dcacrobat_dcreaderwindowsacrobatmac_os_xn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1563
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-58.37% / 98.12%
||
7 Day CHG~0.00%
Published-05 Apr, 2011 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified "On_FC_BINFILE_FCS_*FILE", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910.

Action-Not Available
Vendor-realflexn/a
Product-realwinn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1866
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-66.43% / 98.47%
||
7 Day CHG~0.00%
Published-01 Jul, 2011 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in omniinet.exe in the inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allows remote attackers to execute arbitrary code via a crafted request, related to the EXEC_CMD functionality.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_storage_data_protectorn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1733
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-43.82% / 97.44%
||
7 Day CHG~0.00%
Published-07 May, 2011 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in OmniInet.exe in the Backup Client Service in HP OpenView Storage Data Protector 6.00, 6.10, and 6.11 allows remote attackers to execute arbitrary code via a malformed HPFGConfig message.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_storage_data_protectorn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0918
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-10.61% / 92.99%
||
7 Day CHG~0.00%
Published-08 Feb, 2011 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the NRouter (aka Router) service in IBM Lotus Domino allows remote attackers to execute arbitrary code via long filenames associated with Content-ID and ATTACH:CID headers in attachments in malformed calendar-request e-mail messages, aka SPR KLYH87LKRE.

Action-Not Available
Vendor-n/aIBM Corporation
Product-lotus_dominon/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-10474
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 44.34%
||
7 Day CHG~0.00%
Published-18 Apr, 2018 | 14:00
Updated-16 Sep, 2024 | 17:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear IPQ4019, MDM9206, MDM9607, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, and SD 850, if the buffer length passed to the RIL interface is too large, the buffer size calculation may overflow, resulting in an undersize allocation for the buffer, and subsequently buffer overwrite.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850sd_820asd_412sd_808_firmwaresd_415sd_616sd_425sd_430_firmwaremdm9607_firmwaresd_615mdm9650sd_650_firmwaresd_625sd_615_firmwaremsm8909w_firmwaremdm9607sd_210sd_820_firmwaresd_650sd_820sd_808sd_450_firmwaresd_845_firmwaresd_410sd_617sd_820a_firmwareipq4019_firmwaremdm9206sd_652sd_425_firmwaresd_212_firmwaresd_850_firmwaresd_625_firmwaresd_450sd_412_firmwaresd_845mdm9206_firmwaresd_430ipq4019sd_810sd_835_firmwaremdm9650_firmwaresd_410_firmwaresd_835sd_205sd_210_firmwaresd_415_firmwaresd_652_firmwaremsm8909wsd_810_firmwaresd_616_firmwaresd_205_firmwaresd_212sd_617_firmwareSnapdragon Automobile, Snapdragon Mobile, Snapdragon Wear
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-10484
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.23% / 46.20%
||
7 Day CHG~0.00%
Published-18 Apr, 2018 | 14:00
Updated-17 Sep, 2024 | 01:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear IPQ4019, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, and SDX20, if a RPMB listener is registered with a very small buffer size, the calculation of the maximum transfer size for read and write operations may underflow, resulting in buffer overflow.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9635m_firmwaremdm9640_firmwaresd_820amdm9650sd_615_firmwaremsm8909w_firmwaresd_820mdm9645sd_650sd_450_firmwaresd_410sd_820a_firmwareipq4019_firmwaremdm9206sd_652sd_425_firmwaresd_800_firmwaresd_625_firmwaresd_450mdm9635mmdm9206_firmwaremdm9640sd_835_firmwaremdm9650_firmwaresd_835sd_210_firmwaresd_415_firmwaresd_652_firmwaremsm8909wsd_616_firmwaresd_205_firmwaresd_415sd_650_firmwaresd_212sd_412sd_808_firmwaresd_400sdx20sd_616sd_425sd_430_firmwaremdm9607_firmwaresd_615mdm9655_firmwaresd_625sd_210mdm9607sd_820_firmwaremdm9645_firmwaremdm9625_firmwaresd_808sd_800sd_617sd_400_firmwaresd_212_firmwaremdm9655sd_412_firmwaremdm9625sd_430ipq4019sd_810sdx20_firmwaresd_410_firmwaresd_205sd_810_firmwaresd_617_firmwareSnapdragon Automobile, Snapdragon Mobile, Snapdragon Wear
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0917
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-20.98% / 95.43%
||
7 Day CHG~0.00%
Published-08 Feb, 2011 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in nLDAP.exe in IBM Lotus Domino allows remote attackers to execute arbitrary code via a long string in an LDAP Bind operation, aka SPR KLYH87LMVX.

Action-Not Available
Vendor-n/aIBM Corporation
Product-lotus_dominon/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1206
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-49.84% / 97.73%
||
7 Day CHG~0.00%
Published-21 Apr, 2011 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the server process in ibmslapd.exe in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) allows remote attackers to execute arbitrary code via a crafted LDAP request. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aIBM Corporation
Product-tivoli_directory_servern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2014-3954
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-8.93% / 92.24%
||
7 Day CHG~0.00%
Published-27 Oct, 2014 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in rtsold in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted DNS parameters in a router advertisement message.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-1078
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-9.8||CRITICAL
EPSS-5.72% / 90.09%
||
7 Day CHG~0.00%
Published-11 May, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105.

Action-Not Available
Vendor-n/aApple Inc.Adobe Inc.Microsoft Corporation
Product-acrobat_reader_dcacrobat_dcreaderwindowsacrobatmac_os_xn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0975
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-25.99% / 96.07%
||
7 Day CHG~0.00%
Published-10 Feb, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote attackers to execute arbitrary code via a crafted length value in a BGS_MULTIPLE_READS command to TCP port 6768.

Action-Not Available
Vendor-bmcn/a
Product-performance_analysis_for_serversperformance_predictor_for_serversperformance_analyzer_for_serversperformance_assurance_for_serverscapacity_management_essentialsperformance_assurance_for_virtual_serversn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0915
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-15.36% / 94.37%
||
7 Day CHG~0.00%
Published-08 Feb, 2011 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in nrouter.exe in IBM Lotus Domino before 8.5.3 allows remote attackers to execute arbitrary code via a long name parameter in a Content-Type header in a malformed Notes calendar (aka iCalendar or iCal) meeting request, aka SPR KLYH87LL23.

Action-Not Available
Vendor-n/aIBM Corporation
Product-lotus_dominon/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-10419
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 44.34%
||
7 Day CHG~0.00%
Published-18 Apr, 2018 | 14:00
Updated-17 Sep, 2024 | 04:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9640, MDM9645, MDM9650, MDM9655, SD 450, SD 625, SD 650/52, SD 820, SD 835, SD 845, SD 850, and SDX20, when initializing scheduler object service request, an out of bounds access could occur due to uninitialized object number.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_652sd_850mdm9640_firmwaresd_850_firmwaresd_625_firmwaresd_450mdm9655sdx20sd_845mdm9655_firmwaremdm9650sd_625sd_820_firmwaresd_835_firmwaresd_820mdm9645mdm9645_firmwaresd_650mdm9650_firmwaresdx20_firmwaresd_835sd_450_firmwaresd_845_firmwaresd_652_firmwaresd_650_firmwaremdm9640Snapdragon Mobile
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1741
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-10||HIGH
EPSS-24.61% / 95.92%
||
7 Day CHG~0.00%
Published-19 Jul, 2011 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in ftserver.exe in the OpenText Hummingbird Client Connector, as used in the Indexing Server in EMC Documentum eRoom 7.x before 7.4.3.f and other products, allows remote attackers to execute arbitrary code by sending a crafted message over TCP.

Action-Not Available
Vendor-n/aELAN Microelectronics Corporation
Product-documentum_eroomn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1851
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-29.84% / 96.48%
||
7 Day CHG~0.00%
Published-13 May, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in tftpserver.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to execute arbitrary code via a long mode field.

Action-Not Available
Vendor-n/aHP Inc.
Product-intelligent_management_centern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1735
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-46.09% / 97.55%
||
7 Day CHG~0.00%
Published-07 May, 2011 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in OmniInet.exe in the Backup Client Service in HP OpenView Storage Data Protector 6.00, 6.10, and 6.11 allows remote attackers to execute arbitrary code via a malformed bm message.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_storage_data_protectorn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1728
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-43.82% / 97.44%
||
7 Day CHG~0.00%
Published-07 May, 2011 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in OmniInet.exe in the Backup Client Service in HP OpenView Storage Data Protector 6.00, 6.10, and 6.11 allows remote attackers to execute arbitrary code via a malformed EXEC_BAR message.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_storage_data_protectorn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1914
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-10||HIGH
EPSS-1.32% / 79.06%
||
7 Day CHG~0.00%
Published-21 Feb, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the Advantech ADAM OLE for Process Control (OPC) Server ActiveX control in ADAM OPC Server before 3.01.012, Modbus RTU OPC Server before 3.01.010, and Modbus TCP OPC Server before 3.01.010 allows remote attackers to execute arbitrary code via unspecified vectors.

Action-Not Available
Vendor-n/aAdvantech (Advantech Co., Ltd.)
Product-adam_opc_servermodbus_tcp_opc_servermodbus_rtu_opc_servern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-1848
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-28.87% / 96.39%
||
7 Day CHG~0.00%
Published-13 May, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in img.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to execute arbitrary code via a crafted length field in a packet.

Action-Not Available
Vendor-n/aHP Inc.
Product-intelligent_management_centern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0269
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-49.38% / 97.71%
||
7 Day CHG~0.00%
Published-13 Jan, 2011 | 18:35
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long schd_select1 parameter.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_network_node_managern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0654
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-10||HIGH
EPSS-81.01% / 99.11%
||
7 Day CHG~0.00%
Published-16 Feb, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer underflow in the BowserWriteErrorLogEntry function in the Common Internet File System (CIFS) browser service in Mrxsmb.sys or bowser.sys in Active Directory in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via a malformed BROWSER ELECTION message, leading to a heap-based buffer overflow, aka "Browser Pool Corruption Vulnerability." NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_server_2003windows_2003_servern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0054
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-6.96% / 91.05%
||
7 Day CHG~0.00%
Published-02 Mar, 2011 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving non-local JavaScript variables, aka an "upvarMap" issue.

Action-Not Available
Vendor-n/aMozilla Corporation
Product-firefoxseamonkeyn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0334
Matching Score-4
Assigner-Flexera Software LLC
ShareView Details
Matching Score-4
Assigner-Flexera Software LLC
CVSS Score-10||HIGH
EPSS-22.25% / 95.59%
||
7 Day CHG-2.86%
Published-08 Oct, 2011 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in gwia.exe in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote attackers to execute arbitrary code via a long HTTP request for a .css file.

Action-Not Available
Vendor-n/aNovell
Product-groupwisen/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0262
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-46.77% / 97.59%
||
7 Day CHG~0.00%
Published-13 Jan, 2011 | 18:35
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the stringToSeconds function in ovutil.dll in ovwebsnmpsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via large values of variables to jovgraph.exe.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_network_node_managern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0266
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-78.81% / 99.01%
||
7 Day CHG~0.00%
Published-13 Jan, 2011 | 18:35
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long nameParams parameter, a different vulnerability than CVE-2011-0267.2.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_network_node_managern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-22432
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 39.87%
||
7 Day CHG~0.00%
Published-25 Feb, 2022 | 18:11
Updated-03 Aug, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-magic_uiemuiharmonyosMagic UIHarmonyOSEMUI
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0263
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-10||HIGH
EPSS-49.38% / 97.71%
||
7 Day CHG~0.00%
Published-13 Jan, 2011 | 18:35
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stack-based buffer overflows in ovas.exe in the OVAS service in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allow remote attackers to execute arbitrary code via a long (1) Source Node or (2) Destination Node variable.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_network_node_managern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 32
  • 33
  • Next
Details not found