Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-4339

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-05 Sep, 2006 | 17:00
Updated At-07 Aug, 2024 | 19:06
Rejected At-
Credits

OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:05 Sep, 2006 | 17:00
Updated At:07 Aug, 2024 | 19:06
Rejected At:
▼CVE Numbering Authority (CNA)

OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/
x_refsource_MISC
http://www.vupen.com/english/advisories/2006/4750
vdb-entry
x_refsource_VUPEN
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
vendor-advisory
x_refsource_HP
http://www.vupen.com/english/advisories/2006/3453
vdb-entry
x_refsource_VUPEN
http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
x_refsource_CONFIRM
http://secunia.com/advisories/23915
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1
vendor-advisory
x_refsource_SUNALERT
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
vendor-advisory
x_refsource_HP
http://jvn.jp/en/jp/JVN51615542/index.html
third-party-advisory
x_refsource_JVN
http://docs.info.apple.com/article.html?artnum=307177
x_refsource_MISC
http://secunia.com/advisories/60799
third-party-advisory
x_refsource_SECUNIA
http://www.osvdb.org/28549
vdb-entry
x_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/4366
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22932
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3748
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/21791
third-party-advisory
x_refsource_SECUNIA
http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html
x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/26893
third-party-advisory
x_refsource_SECUNIA
http://www.openssl.org/news/secadv_20060905.txt
x_refsource_CONFIRM
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
http://secunia.com/advisories/22509
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:207
vendor-advisory
x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2006-0661.html
vendor-advisory
x_refsource_REDHAT
http://www.novell.com/linux/security/advisories/2006_61_opera.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/21930
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22940
third-party-advisory
x_refsource_SECUNIA
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/21852
third-party-advisory
x_refsource_SECUNIA
http://dev2dev.bea.com/pub/advisory/238
vendor-advisory
x_refsource_BEA
http://secunia.com/advisories/21823
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1
vendor-advisory
x_refsource_SUNALERT
http://secunia.com/advisories/22758
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22938
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3899
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22044
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1945
vdb-entry
x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2007-0062.html
vendor-advisory
x_refsource_REDHAT
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html
vendor-advisory
x_refsource_OPENPKG
http://www.vupen.com/english/advisories/2006/4206
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/3730
vdb-entry
x_refsource_VUPEN
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/21812
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22523
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/450327/100/0/threaded
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/22689
third-party-advisory
x_refsource_SECUNIA
http://docs.info.apple.com/article.html?artnum=304829
x_refsource_CONFIRM
http://secunia.com/advisories/23794
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=130497311408250&w=2
vendor-advisory
x_refsource_HP
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1
vendor-advisory
x_refsource_SUNALERT
http://security.gentoo.org/glsa/glsa-200609-05.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/22711
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/445231/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
http://openvpn.net/changelog.html
x_refsource_CONFIRM
http://www.vmware.com/support/server/doc/releasenotes_server.html
x_refsource_CONFIRM
http://www.openbsd.org/errata.html
vendor-advisory
x_refsource_OPENBSD
http://secunia.com/advisories/22733
third-party-advisory
x_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-1633
x_refsource_CONFIRM
http://secunia.com/advisories/22949
third-party-advisory
x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955
vendor-advisory
x_refsource_SLACKWARE
http://www.ubuntu.com/usn/usn-339-1
vendor-advisory
x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2006/3566
vdb-entry
x_refsource_VUPEN
http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf
x_refsource_CONFIRM
http://www.novell.com/linux/security/advisories/2006_26_sr.html
vendor-advisory
x_refsource_SUSE
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
x_refsource_CONFIRM
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1
vendor-advisory
x_refsource_SUNALERT
http://secunia.com/advisories/22446
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22939
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/24099
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/445822/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/25284
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/22083
vdb-entry
x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
vendor-advisory
x_refsource_MANDRIVA
http://securitytracker.com/id?1016791
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/25649
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/0366
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22671
third-party-advisory
x_refsource_SECUNIA
http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
mailing-list
x_refsource_MLIST
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1
vendor-advisory
x_refsource_SUNALERT
http://secunia.com/advisories/21785
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
x_refsource_CONFIRM
http://secunia.com/advisories/31492
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4329
vdb-entry
x_refsource_VUPEN
http://www.us.debian.org/security/2006/dsa-1173
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/38567
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22284
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/24930
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4327
vdb-entry
x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDKSA-2006:161
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/21778
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0629.html
vendor-advisory
x_refsource_REDHAT
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1
vendor-advisory
x_refsource_SUNALERT
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
vendor-advisory
x_refsource_APPLE
http://www.vupen.com/english/advisories/2007/2163
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/26329
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22260
third-party-advisory
x_refsource_SECUNIA
https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/0343
vdb-entry
x_refsource_VUPEN
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
x_refsource_CONFIRM
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1
vendor-advisory
x_refsource_SUNALERT
http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html
vendor-advisory
x_refsource_SUSE
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
vendor-advisory
x_refsource_SGI
http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm
x_refsource_CONFIRM
http://www.vmware.com/support/player/doc/releasenotes_player.html
x_refsource_CONFIRM
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
x_refsource_CONFIRM
http://secunia.com/advisories/21982
third-party-advisory
x_refsource_SECUNIA
http://support.attachmate.com/techdocs/2137.html
x_refsource_CONFIRM
http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
x_refsource_CONFIRM
https://issues.rpath.com/browse/RPL-616
x_refsource_CONFIRM
http://support.attachmate.com/techdocs/2127.html
x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml
vendor-advisory
x_refsource_GENTOO
http://www.debian.org/security/2006/dsa-1174
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/23155
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1
vendor-advisory
x_refsource_SUNALERT
http://www.openoffice.org/security/cves/CVE-2006-4339.html
x_refsource_CONFIRM
http://secunia.com/advisories/22799
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4207
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/4417
vdb-entry
x_refsource_VUPEN
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
vendor-advisory
x_refsource_HP
http://www.sybase.com/detail?id=1047991
x_refsource_CONFIRM
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/21873
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=130497311408250&w=2
vendor-advisory
x_refsource_HP
http://www.redhat.com/support/errata/RHSA-2007-0072.html
vendor-advisory
x_refsource_REDHAT
http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html
third-party-advisory
x_refsource_JVNDB
http://www.serv-u.com/releasenotes/
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/4744
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/38568
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/21846
third-party-advisory
x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
x_refsource_CONFIRM
http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
x_refsource_CONFIRM
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
vendor-advisory
x_refsource_HP
http://www.vupen.com/english/advisories/2007/0254
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/archive/1/450327/100/0/threaded
vendor-advisory
x_refsource_HP
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
vendor-advisory
x_refsource_HP
http://www.vupen.com/english/advisories/2007/4224
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22161
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bind-announce&m=116253119512445&w=2
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/22937
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22325
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
vendor-advisory
x_refsource_SUNALERT
http://www.vupen.com/english/advisories/2007/2315
vdb-entry
x_refsource_VUPEN
http://www.opera.com/support/search/supsearch.dml?index=845
x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
vendor-advisory
x_refsource_APPLE
http://secunia.com/advisories/21767
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1815
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22232
third-party-advisory
x_refsource_SECUNIA
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
third-party-advisory
x_refsource_CERT
http://secunia.com/advisories/21906
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/489739/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://lists.vmware.com/pipermail/security-announce/2008/000008.html
mailing-list
x_refsource_MLIST
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/22934
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2007-0073.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/22585
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/25399
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0905/references
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/1401
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1
vendor-advisory
x_refsource_SUNALERT
https://exchange.xforce.ibmcloud.com/vulnerabilities/28755
vdb-entry
x_refsource_XF
http://secunia.com/advisories/22513
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/41818
third-party-advisory
x_refsource_SECUNIA
http://support.attachmate.com/techdocs/2128.html
x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656
vdb-entry
signature
x_refsource_OVAL
http://www.vmware.com/security/advisories/VMSA-2008-0005.html
x_refsource_CONFIRM
http://secunia.com/advisories/21776
third-party-advisory
x_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
vendor-advisory
x_refsource_HP
http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc
vendor-advisory
x_refsource_FREEBSD
http://secunia.com/advisories/23455
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/456546/100/200/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/28115
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22226
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3936
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22066
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22936
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html
vendor-advisory
x_refsource_OPENPKG
http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/22545
third-party-advisory
x_refsource_SECUNIA
http://securitytracker.com/id?1017522
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/22948
third-party-advisory
x_refsource_SECUNIA
http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
vendor-advisory
x_refsource_CISCO
http://secunia.com/advisories/23841
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4205
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/2783
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22259
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22036
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1
vendor-advisory
x_refsource_SUNALERT
http://www.vupen.com/english/advisories/2006/4586
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/21927
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_55_ssl.html
vendor-advisory
x_refsource_SUSE
http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/5146
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/21870
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4216
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/3793
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/bid/28276
vdb-entry
x_refsource_BID
http://secunia.com/advisories/21709
third-party-advisory
x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/845620
third-party-advisory
x_refsource_CERT-VN
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306
vendor-advisory
x_refsource_SLACKWARE
http://security.gentoo.org/glsa/glsa-200609-18.xml
vendor-advisory
x_refsource_GENTOO
http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
vendor-advisory
x_refsource_CISCO
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1
vendor-advisory
x_refsource_SUNALERT
http://secunia.com/advisories/24950
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/19849
vdb-entry
x_refsource_BID
Hyperlink: http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/
Resource:
x_refsource_MISC
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.vupen.com/english/advisories/2006/3453
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/23915
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://jvn.jp/en/jp/JVN51615542/index.html
Resource:
third-party-advisory
x_refsource_JVN
Hyperlink: http://docs.info.apple.com/article.html?artnum=307177
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/60799
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.osvdb.org/28549
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.vupen.com/english/advisories/2006/4366
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22932
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/3748
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/21791
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/26893
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.openssl.org/news/secadv_20060905.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22509
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:207
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0661.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.novell.com/linux/security/advisories/2006_61_opera.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/21930
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22940
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/21852
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://dev2dev.bea.com/pub/advisory/238
Resource:
vendor-advisory
x_refsource_BEA
Hyperlink: http://secunia.com/advisories/21823
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://secunia.com/advisories/22758
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22938
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/3899
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22044
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/1945
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0062.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html
Resource:
vendor-advisory
x_refsource_OPENPKG
Hyperlink: http://www.vupen.com/english/advisories/2006/4206
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2006/3730
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/21812
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22523
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/450327/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/22689
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/23794
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-05.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/22711
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/445231/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://openvpn.net/changelog.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.openbsd.org/errata.html
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://secunia.com/advisories/22733
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://issues.rpath.com/browse/RPL-1633
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22949
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://www.ubuntu.com/usn/usn-339-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.vupen.com/english/advisories/2006/3566
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.novell.com/linux/security/advisories/2006_26_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://secunia.com/advisories/22446
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22939
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/24099
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/445822/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/25284
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/22083
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://securitytracker.com/id?1016791
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/25649
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2010/0366
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22671
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://secunia.com/advisories/21785
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31492
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/4329
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.us.debian.org/security/2006/dsa-1173
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/38567
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22284
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/24930
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/4327
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:161
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/21778
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.vupen.com/english/advisories/2007/2163
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/26329
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22260
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2007/0343
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
Resource:
x_refsource_CONFIRM
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/21982
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.attachmate.com/techdocs/2137.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://issues.rpath.com/browse/RPL-616
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.attachmate.com/techdocs/2127.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.debian.org/security/2006/dsa-1174
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/23155
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.openoffice.org/security/cves/CVE-2006-4339.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22799
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/4207
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2006/4417
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.sybase.com/detail?id=1047991
Resource:
x_refsource_CONFIRM
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/21873
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0072.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html
Resource:
third-party-advisory
x_refsource_JVNDB
Hyperlink: http://www.serv-u.com/releasenotes/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/4744
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/38568
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/21846
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.vupen.com/english/advisories/2007/0254
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/archive/1/450327/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.vupen.com/english/advisories/2007/4224
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22161
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bind-announce&m=116253119512445&w=2
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/22937
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22325
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.vupen.com/english/advisories/2007/2315
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.opera.com/support/search/supsearch.dml?index=845
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://secunia.com/advisories/21767
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/1815
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22232
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://secunia.com/advisories/21906
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/489739/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000008.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/22934
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0073.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/22585
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/25399
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/0905/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/28755
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/22513
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/41818
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.attachmate.com/techdocs/2128.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0005.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/21776
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: http://secunia.com/advisories/23455
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/28115
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22226
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/3936
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22066
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22936
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html
Resource:
vendor-advisory
x_refsource_OPENPKG
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/22545
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://securitytracker.com/id?1017522
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/22948
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://secunia.com/advisories/23841
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/4205
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2007/2783
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22259
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22036
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.vupen.com/english/advisories/2006/4586
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/21927
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/linux/security/advisories/2006_55_ssl.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/5146
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/21870
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/4216
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2006/3793
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/bid/28276
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/advisories/21709
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.kb.cert.org/vuls/id/845620
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-18.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://secunia.com/advisories/24950
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/19849
Resource:
vdb-entry
x_refsource_BID
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/
x_refsource_MISC
x_transferred
http://www.vupen.com/english/advisories/2006/4750
vdb-entry
x_refsource_VUPEN
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
vendor-advisory
x_refsource_HP
x_transferred
http://www.vupen.com/english/advisories/2006/3453
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/23915
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
vendor-advisory
x_refsource_HP
x_transferred
http://jvn.jp/en/jp/JVN51615542/index.html
third-party-advisory
x_refsource_JVN
x_transferred
http://docs.info.apple.com/article.html?artnum=307177
x_refsource_MISC
x_transferred
http://secunia.com/advisories/60799
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.osvdb.org/28549
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.vupen.com/english/advisories/2006/4366
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22932
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/3748
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/21791
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html
x_refsource_CONFIRM
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/26893
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.openssl.org/news/secadv_20060905.txt
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22509
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:207
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0661.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.novell.com/linux/security/advisories/2006_61_opera.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/21930
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22940
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/21852
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://dev2dev.bea.com/pub/advisory/238
vendor-advisory
x_refsource_BEA
x_transferred
http://secunia.com/advisories/21823
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://secunia.com/advisories/22758
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22938
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/3899
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22044
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/1945
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-0062.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html
vendor-advisory
x_refsource_OPENPKG
x_transferred
http://www.vupen.com/english/advisories/2006/4206
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2006/3730
vdb-entry
x_refsource_VUPEN
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/21812
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22523
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/450327/100/0/threaded
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/22689
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://docs.info.apple.com/article.html?artnum=304829
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/23794
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=130497311408250&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://security.gentoo.org/glsa/glsa-200609-05.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/22711
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/445231/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://openvpn.net/changelog.html
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/server/doc/releasenotes_server.html
x_refsource_CONFIRM
x_transferred
http://www.openbsd.org/errata.html
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://secunia.com/advisories/22733
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://issues.rpath.com/browse/RPL-1633
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22949
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://www.ubuntu.com/usn/usn-339-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.vupen.com/english/advisories/2006/3566
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf
x_refsource_CONFIRM
x_transferred
http://www.novell.com/linux/security/advisories/2006_26_sr.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
x_refsource_CONFIRM
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://secunia.com/advisories/22446
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22939
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/24099
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/445822/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/25284
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/22083
vdb-entry
x_refsource_BID
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://securitytracker.com/id?1016791
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/25649
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2010/0366
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22671
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
mailing-list
x_refsource_MLIST
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://secunia.com/advisories/21785
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31492
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/4329
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.us.debian.org/security/2006/dsa-1173
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/38567
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22284
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/24930
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/4327
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:161
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/21778
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0629.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.vupen.com/english/advisories/2007/2163
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/26329
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22260
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2007/0343
vdb-entry
x_refsource_VUPEN
x_transferred
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
x_refsource_CONFIRM
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
vendor-advisory
x_refsource_SGI
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/player/doc/releasenotes_player.html
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/21982
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.attachmate.com/techdocs/2137.html
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
x_refsource_CONFIRM
x_transferred
https://issues.rpath.com/browse/RPL-616
x_refsource_CONFIRM
x_transferred
http://support.attachmate.com/techdocs/2127.html
x_refsource_CONFIRM
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.debian.org/security/2006/dsa-1174
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/23155
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.openoffice.org/security/cves/CVE-2006-4339.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22799
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/4207
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2006/4417
vdb-entry
x_refsource_VUPEN
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
vendor-advisory
x_refsource_HP
x_transferred
http://www.sybase.com/detail?id=1047991
x_refsource_CONFIRM
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/21873
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=130497311408250&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-0072.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html
third-party-advisory
x_refsource_JVNDB
x_transferred
http://www.serv-u.com/releasenotes/
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/4744
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/38568
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/21846
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
x_refsource_CONFIRM
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
vendor-advisory
x_refsource_HP
x_transferred
http://www.vupen.com/english/advisories/2007/0254
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/archive/1/450327/100/0/threaded
vendor-advisory
x_refsource_HP
x_transferred
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
vendor-advisory
x_refsource_HP
x_transferred
http://www.vupen.com/english/advisories/2007/4224
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22161
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bind-announce&m=116253119512445&w=2
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/22937
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22325
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.vupen.com/english/advisories/2007/2315
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.opera.com/support/search/supsearch.dml?index=845
x_refsource_CONFIRM
x_transferred
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://secunia.com/advisories/21767
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/1815
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22232
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://secunia.com/advisories/21906
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/489739/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://lists.vmware.com/pipermail/security-announce/2008/000008.html
mailing-list
x_refsource_MLIST
x_transferred
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/22934
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
x_refsource_CONFIRM
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-0073.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/22585
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/25399
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/0905/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2007/1401
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/28755
vdb-entry
x_refsource_XF
x_transferred
http://secunia.com/advisories/22513
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/41818
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.attachmate.com/techdocs/2128.html
x_refsource_CONFIRM
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.vmware.com/security/advisories/VMSA-2008-0005.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/21776
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
vendor-advisory
x_refsource_HP
x_transferred
http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
http://secunia.com/advisories/23455
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/456546/100/200/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/28115
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22226
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/3936
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22066
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22936
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html
vendor-advisory
x_refsource_OPENPKG
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/22545
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://securitytracker.com/id?1017522
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/22948
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
vendor-advisory
x_refsource_CISCO
x_transferred
http://secunia.com/advisories/23841
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/4205
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2007/2783
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22259
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22036
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.vupen.com/english/advisories/2006/4586
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/21927
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/linux/security/advisories/2006_55_ssl.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/5146
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/21870
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/4216
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2006/3793
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/bid/28276
vdb-entry
x_refsource_BID
x_transferred
http://secunia.com/advisories/21709
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.kb.cert.org/vuls/id/845620
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://security.gentoo.org/glsa/glsa-200609-18.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
vendor-advisory
x_refsource_CISCO
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://secunia.com/advisories/24950
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/19849
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3453
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/23915
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://jvn.jp/en/jp/JVN51615542/index.html
Resource:
third-party-advisory
x_refsource_JVN
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=307177
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/60799
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.osvdb.org/28549
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4366
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22932
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3748
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/21791
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/26893
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.openssl.org/news/secadv_20060905.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22509
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:207
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0661.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_61_opera.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/21930
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22940
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/21852
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://dev2dev.bea.com/pub/advisory/238
Resource:
vendor-advisory
x_refsource_BEA
x_transferred
Hyperlink: http://secunia.com/advisories/21823
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://secunia.com/advisories/22758
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22938
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3899
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22044
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/1945
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0062.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html
Resource:
vendor-advisory
x_refsource_OPENPKG
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4206
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3730
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/21812
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22523
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/450327/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/22689
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/23794
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-05.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/22711
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/445231/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://openvpn.net/changelog.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.openbsd.org/errata.html
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://secunia.com/advisories/22733
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-1633
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22949
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-339-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3566
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_26_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://secunia.com/advisories/22446
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22939
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/24099
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/445822/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/25284
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/22083
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://securitytracker.com/id?1016791
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/25649
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/0366
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22671
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://secunia.com/advisories/21785
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31492
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4329
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.us.debian.org/security/2006/dsa-1173
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/38567
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22284
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/24930
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4327
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:161
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/21778
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2163
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/26329
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22260
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/0343
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/21982
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.attachmate.com/techdocs/2137.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-616
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.attachmate.com/techdocs/2127.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1174
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/23155
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.openoffice.org/security/cves/CVE-2006-4339.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22799
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4207
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4417
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.sybase.com/detail?id=1047991
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/21873
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0072.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html
Resource:
third-party-advisory
x_refsource_JVNDB
x_transferred
Hyperlink: http://www.serv-u.com/releasenotes/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4744
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/38568
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/21846
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/0254
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/450327/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/4224
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22161
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bind-announce&m=116253119512445&w=2
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/22937
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22325
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2315
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.opera.com/support/search/supsearch.dml?index=845
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://secunia.com/advisories/21767
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/1815
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22232
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://secunia.com/advisories/21906
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/489739/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000008.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/22934
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0073.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/22585
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/25399
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/0905/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/28755
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/22513
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/41818
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.attachmate.com/techdocs/2128.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0005.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/21776
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: http://secunia.com/advisories/23455
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/28115
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22226
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3936
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22066
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22936
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html
Resource:
vendor-advisory
x_refsource_OPENPKG
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/22545
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://securitytracker.com/id?1017522
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/22948
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://secunia.com/advisories/23841
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4205
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2783
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22259
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22036
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4586
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/21927
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_55_ssl.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/5146
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/21870
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4216
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3793
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/bid/28276
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/advisories/21709
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/845620
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-18.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://secunia.com/advisories/24950
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/19849
Resource:
vdb-entry
x_refsource_BID
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:05 Sep, 2006 | 17:04
Updated At:03 Apr, 2025 | 01:03

OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

OpenSSL
openssl
>>openssl>>Versions up to 0.9.7(inclusive)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.1c
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.2b
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.3
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.3a
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.4
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.5
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.5
cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.5
cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.5a
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.5a
cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.5a
cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6
cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6
cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6
cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6a
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6a
cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6a
cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6a
cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6b
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6c
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6d
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6e
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6f
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6g
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6h
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6i
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6j
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6k
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6l
cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.6m
cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7a
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7b
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7c
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7d
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7e
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7f
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7g
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7h
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7i
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7j
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.8
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.8a
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.8b
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-310Primarynvd@nist.gov
CWE ID: CWE-310
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2007-03-14T00:00:00

Vulnerable. This issue affects OpenSSL and OpenSSL compatibility packages in Red Hat Enterprise Linux 2.1, 3, and 4. Updates, along with our advisory are available at the URL below. http://rhn.redhat.com/errata/RHSA-2006-0661.html Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References
HyperlinkSourceResource
ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.ascsecalert@redhat.com
N/A
http://dev2dev.bea.com/pub/advisory/238secalert@redhat.com
N/A
http://docs.info.apple.com/article.html?artnum=304829secalert@redhat.com
N/A
http://docs.info.apple.com/article.html?artnum=307177secalert@redhat.com
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495secalert@redhat.com
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495secalert@redhat.com
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771secalert@redhat.com
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771secalert@redhat.com
N/A
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540secalert@redhat.com
N/A
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540secalert@redhat.com
N/A
http://jvn.jp/en/jp/JVN51615542/index.htmlsecalert@redhat.com
N/A
http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.htmlsecalert@redhat.com
N/A
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.htmlsecalert@redhat.com
N/A
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.htmlsecalert@redhat.com
N/A
http://lists.vmware.com/pipermail/security-announce/2008/000008.htmlsecalert@redhat.com
N/A
http://marc.info/?l=bind-announce&m=116253119512445&w=2secalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=130497311408250&w=2secalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=130497311408250&w=2secalert@redhat.com
N/A
http://openvpn.net/changelog.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/21709secalert@redhat.com
Patch
Vendor Advisory
http://secunia.com/advisories/21767secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21776secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21778secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21785secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21791secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21812secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21823secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21846secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21852secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21870secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21873secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21906secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21927secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21930secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21982secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22036secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22044secalert@redhat.com
N/A
http://secunia.com/advisories/22066secalert@redhat.com
N/A
http://secunia.com/advisories/22161secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22226secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22232secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22259secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22260secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22284secalert@redhat.com
N/A
http://secunia.com/advisories/22325secalert@redhat.com
N/A
http://secunia.com/advisories/22446secalert@redhat.com
N/A
http://secunia.com/advisories/22509secalert@redhat.com
N/A
http://secunia.com/advisories/22513secalert@redhat.com
N/A
http://secunia.com/advisories/22523secalert@redhat.com
N/A
http://secunia.com/advisories/22545secalert@redhat.com
N/A
http://secunia.com/advisories/22585secalert@redhat.com
N/A
http://secunia.com/advisories/22671secalert@redhat.com
N/A
http://secunia.com/advisories/22689secalert@redhat.com
N/A
http://secunia.com/advisories/22711secalert@redhat.com
N/A
http://secunia.com/advisories/22733secalert@redhat.com
N/A
http://secunia.com/advisories/22758secalert@redhat.com
N/A
http://secunia.com/advisories/22799secalert@redhat.com
N/A
http://secunia.com/advisories/22932secalert@redhat.com
N/A
http://secunia.com/advisories/22934secalert@redhat.com
N/A
http://secunia.com/advisories/22936secalert@redhat.com
N/A
http://secunia.com/advisories/22937secalert@redhat.com
N/A
http://secunia.com/advisories/22938secalert@redhat.com
N/A
http://secunia.com/advisories/22939secalert@redhat.com
N/A
http://secunia.com/advisories/22940secalert@redhat.com
N/A
http://secunia.com/advisories/22948secalert@redhat.com
N/A
http://secunia.com/advisories/22949secalert@redhat.com
N/A
http://secunia.com/advisories/23155secalert@redhat.com
N/A
http://secunia.com/advisories/23455secalert@redhat.com
N/A
http://secunia.com/advisories/23680secalert@redhat.com
N/A
http://secunia.com/advisories/23794secalert@redhat.com
N/A
http://secunia.com/advisories/23841secalert@redhat.com
N/A
http://secunia.com/advisories/23915secalert@redhat.com
N/A
http://secunia.com/advisories/24099secalert@redhat.com
N/A
http://secunia.com/advisories/24930secalert@redhat.com
N/A
http://secunia.com/advisories/24950secalert@redhat.com
N/A
http://secunia.com/advisories/25284secalert@redhat.com
N/A
http://secunia.com/advisories/25399secalert@redhat.com
N/A
http://secunia.com/advisories/25649secalert@redhat.com
N/A
http://secunia.com/advisories/26329secalert@redhat.com
N/A
http://secunia.com/advisories/26893secalert@redhat.com
N/A
http://secunia.com/advisories/28115secalert@redhat.com
N/A
http://secunia.com/advisories/31492secalert@redhat.com
N/A
http://secunia.com/advisories/38567secalert@redhat.com
N/A
http://secunia.com/advisories/38568secalert@redhat.com
N/A
http://secunia.com/advisories/41818secalert@redhat.com
N/A
http://secunia.com/advisories/60799secalert@redhat.com
N/A
http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.ascsecalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200609-05.xmlsecalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200609-18.xmlsecalert@redhat.com
N/A
http://securitytracker.com/id?1016791secalert@redhat.com
N/A
http://securitytracker.com/id?1017522secalert@redhat.com
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955secalert@redhat.com
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1secalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1secalert@redhat.com
N/A
http://support.attachmate.com/techdocs/2127.htmlsecalert@redhat.com
N/A
http://support.attachmate.com/techdocs/2128.htmlsecalert@redhat.com
N/A
http://support.attachmate.com/techdocs/2137.htmlsecalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-188.htmsecalert@redhat.com
N/A
http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdfsecalert@redhat.com
N/A
http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.htmlsecalert@redhat.com
N/A
http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.htmlsecalert@redhat.com
N/A
http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtmlsecalert@redhat.com
N/A
http://www.debian.org/security/2006/dsa-1174secalert@redhat.com
Patch
http://www.gentoo.org/security/en/glsa/glsa-200610-06.xmlsecalert@redhat.com
N/A
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xmlsecalert@redhat.com
N/A
http://www.imc.org/ietf-openpgp/mail-archive/msg14307.htmlsecalert@redhat.com
N/A
http://www.kb.cert.org/vuls/id/845620secalert@redhat.com
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:161secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:177secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:178secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:207secalert@redhat.com
N/A
http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/secalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_26_sr.htmlsecalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_55_ssl.htmlsecalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_61_opera.htmlsecalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2007_10_ibmjava.htmlsecalert@redhat.com
N/A
http://www.openbsd.org/errata.htmlsecalert@redhat.com
N/A
http://www.openoffice.org/security/cves/CVE-2006-4339.htmlsecalert@redhat.com
N/A
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.htmlsecalert@redhat.com
N/A
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.htmlsecalert@redhat.com
N/A
http://www.openssl.org/news/secadv_20060905.txtsecalert@redhat.com
Patch
Vendor Advisory
http://www.opera.com/support/search/supsearch.dml?index=845secalert@redhat.com
N/A
http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.htmlsecalert@redhat.com
N/A
http://www.osvdb.org/28549secalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2006-0661.htmlsecalert@redhat.com
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0062.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2007-0072.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2007-0073.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2008-0629.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/445231/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/445822/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/450327/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/450327/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/456546/100/200/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/489739/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/19849secalert@redhat.com
Patch
http://www.securityfocus.com/bid/22083secalert@redhat.com
N/A
http://www.securityfocus.com/bid/28276secalert@redhat.com
N/A
http://www.serv-u.com/releasenotes/secalert@redhat.com
N/A
http://www.sybase.com/detail?id=1047991secalert@redhat.com
N/A
http://www.ubuntu.com/usn/usn-339-1secalert@redhat.com
Patch
http://www.us-cert.gov/cas/techalerts/TA06-333A.htmlsecalert@redhat.com
US Government Resource
http://www.us.debian.org/security/2006/dsa-1173secalert@redhat.com
Patch
http://www.vmware.com/security/advisories/VMSA-2008-0005.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/player/doc/releasenotes_player.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/player2/doc/releasenotes_player2.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/server/doc/releasenotes_server.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.htmlsecalert@redhat.com
N/A
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.htmlsecalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3453secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3566secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3730secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3748secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3793secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3899secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/3936secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4205secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4206secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4207secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4216secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4327secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4329secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4366secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4417secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4586secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4744secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4750secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/5146secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/0254secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/0343secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/1401secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/1815secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/1945secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2163secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2315secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2783secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/4224secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2008/0905/referencessecalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2010/0366secalert@redhat.com
N/A
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742secalert@redhat.com
N/A
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742secalert@redhat.com
N/A
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/28755secalert@redhat.com
N/A
https://issues.rpath.com/browse/RPL-1633secalert@redhat.com
N/A
https://issues.rpath.com/browse/RPL-616secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656secalert@redhat.com
N/A
https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.htmlsecalert@redhat.com
N/A
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144secalert@redhat.com
N/A
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144secalert@redhat.com
N/A
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144secalert@redhat.com
N/A
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144secalert@redhat.com
N/A
ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.ascaf854a3a-2127-422b-91ae-364da2661108
N/A
http://dev2dev.bea.com/pub/advisory/238af854a3a-2127-422b-91ae-364da2661108
N/A
http://docs.info.apple.com/article.html?artnum=304829af854a3a-2127-422b-91ae-364da2661108
N/A
http://docs.info.apple.com/article.html?artnum=307177af854a3a-2127-422b-91ae-364da2661108
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495af854a3a-2127-422b-91ae-364da2661108
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495af854a3a-2127-422b-91ae-364da2661108
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771af854a3a-2127-422b-91ae-364da2661108
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771af854a3a-2127-422b-91ae-364da2661108
N/A
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540af854a3a-2127-422b-91ae-364da2661108
N/A
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540af854a3a-2127-422b-91ae-364da2661108
N/A
http://jvn.jp/en/jp/JVN51615542/index.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.vmware.com/pipermail/security-announce/2008/000008.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bind-announce&m=116253119512445&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=130497311408250&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=130497311408250&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://openvpn.net/changelog.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/21709af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://secunia.com/advisories/21767af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21776af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21778af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21785af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21791af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21812af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21823af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21846af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21852af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21870af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21873af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21906af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21927af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21930af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21982af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22036af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22044af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22066af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22161af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22226af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22232af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22259af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22260af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22284af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22325af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22446af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22509af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22513af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22523af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22545af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22585af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22671af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22689af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22711af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22733af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22758af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22799af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22932af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22934af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22936af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22937af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22938af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22939af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22940af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22948af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/22949af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/23155af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/23455af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/23680af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/23794af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/23841af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/23915af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/24099af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/24930af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/24950af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/25284af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/25399af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/25649af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/26329af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/26893af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/28115af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/31492af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/38567af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/38568af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/41818af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60799af854a3a-2127-422b-91ae-364da2661108
N/A
http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.ascaf854a3a-2127-422b-91ae-364da2661108
N/A
http://security.gentoo.org/glsa/glsa-200609-05.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://security.gentoo.org/glsa/glsa-200609-18.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1016791af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1017522af854a3a-2127-422b-91ae-364da2661108
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955af854a3a-2127-422b-91ae-364da2661108
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.attachmate.com/techdocs/2127.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://support.attachmate.com/techdocs/2128.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://support.attachmate.com/techdocs/2137.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-188.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdfaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2006/dsa-1174af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.gentoo.org/security/en/glsa/glsa-200610-06.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.imc.org/ietf-openpgp/mail-archive/msg14307.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.kb.cert.org/vuls/id/845620af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:161af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:177af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:178af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:207af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/linux/security/advisories/2006_26_sr.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/linux/security/advisories/2006_55_ssl.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/linux/security/advisories/2006_61_opera.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/linux/security/advisories/2007_10_ibmjava.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openbsd.org/errata.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openoffice.org/security/cves/CVE-2006-4339.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openssl.org/news/secadv_20060905.txtaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.opera.com/support/search/supsearch.dml?index=845af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/28549af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2006-0661.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0062.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2007-0072.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2007-0073.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2008-0629.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/445231/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/445822/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/450327/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/450327/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/456546/100/200/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/489739/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/19849af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/bid/22083af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/28276af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.serv-u.com/releasenotes/af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.sybase.com/detail?id=1047991af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/usn-339-1af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.us-cert.gov/cas/techalerts/TA06-333A.htmlaf854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.us.debian.org/security/2006/dsa-1173af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.vmware.com/security/advisories/VMSA-2008-0005.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/player/doc/releasenotes_player.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/player2/doc/releasenotes_player2.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/server/doc/releasenotes_server.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/3453af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/3566af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/3730af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/3748af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/3793af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/3899af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/3936af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/4205af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/4206af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/4207af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/4216af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/4327af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/4329af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/4366af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/4417af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/4586af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/4744af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/4750af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/5146af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2007/0254af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2007/0343af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2007/1401af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2007/1815af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2007/1945af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2007/2163af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2007/2315af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2007/2783af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2007/4224af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2008/0905/referencesaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2010/0366af854a3a-2127-422b-91ae-364da2661108
N/A
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742af854a3a-2127-422b-91ae-364da2661108
N/A
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742af854a3a-2127-422b-91ae-364da2661108
N/A
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/28755af854a3a-2127-422b-91ae-364da2661108
N/A
https://issues.rpath.com/browse/RPL-1633af854a3a-2127-422b-91ae-364da2661108
N/A
https://issues.rpath.com/browse/RPL-616af854a3a-2127-422b-91ae-364da2661108
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656af854a3a-2127-422b-91ae-364da2661108
N/A
https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144af854a3a-2127-422b-91ae-364da2661108
N/A
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144af854a3a-2127-422b-91ae-364da2661108
N/A
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144af854a3a-2127-422b-91ae-364da2661108
N/A
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://dev2dev.bea.com/pub/advisory/238
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=307177
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://jvn.jp/en/jp/JVN51615542/index.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000008.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bind-announce&m=116253119512445&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://openvpn.net/changelog.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/21709
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21767
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21776
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21778
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21785
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21791
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21812
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21823
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21846
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21852
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21870
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21873
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21906
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21927
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21930
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21982
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22036
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22044
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22066
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22161
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22226
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22232
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22259
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22260
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22284
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22325
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22446
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22509
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22513
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22523
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22545
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22585
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22671
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22689
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22711
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22733
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22758
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22799
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22932
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22934
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22936
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22937
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22938
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22939
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22940
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22948
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22949
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23155
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23455
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23680
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23794
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23841
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23915
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24099
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24930
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24950
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25284
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25399
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25649
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/26329
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/26893
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/28115
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/31492
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/38567
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/38568
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/41818
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60799
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-05.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-18.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securitytracker.com/id?1016791
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securitytracker.com/id?1017522
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.attachmate.com/techdocs/2127.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.attachmate.com/techdocs/2128.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.attachmate.com/techdocs/2137.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2006/dsa-1174
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.kb.cert.org/vuls/id/845620
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:161
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:207
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_26_sr.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_55_ssl.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_61_opera.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openbsd.org/errata.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openoffice.org/security/cves/CVE-2006-4339.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openssl.org/news/secadv_20060905.txt
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.opera.com/support/search/supsearch.dml?index=845
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.osvdb.org/28549
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0661.html
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0062.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0072.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0073.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/445231/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/445822/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/450327/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/450327/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/489739/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/19849
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.securityfocus.com/bid/22083
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/28276
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.serv-u.com/releasenotes/
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.sybase.com/detail?id=1047991
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-339-1
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.us.debian.org/security/2006/dsa-1173
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0005.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3453
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3566
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3730
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3748
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3793
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3899
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3936
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4205
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4206
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4207
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4216
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4327
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4329
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4366
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4417
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4586
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4744
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/5146
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/0254
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/0343
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1815
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1945
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2163
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2315
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2783
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/4224
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/0905/references
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/0366
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/28755
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-1633
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-616
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Source: secalert@redhat.com
Resource: N/A
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://dev2dev.bea.com/pub/advisory/238
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=307177
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://jvn.jp/en/jp/JVN51615542/index.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000008.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bind-announce&m=116253119512445&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://openvpn.net/changelog.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/21709
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21767
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21776
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21778
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21785
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21791
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21812
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21823
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21846
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21852
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21870
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21873
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21906
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21927
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21930
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/21982
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22036
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22044
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22066
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22161
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22226
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22232
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22259
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22260
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22284
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22325
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22446
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22509
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22513
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22523
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22545
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22585
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22671
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22689
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22711
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22733
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22758
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22799
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22932
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22934
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22936
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22937
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22938
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22939
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22940
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22948
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/22949
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/23155
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/23455
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/23680
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/23794
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/23841
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/23915
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/24099
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/24930
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/24950
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/25284
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/25399
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/25649
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/26329
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/26893
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/28115
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/31492
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/38567
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/38568
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/41818
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60799
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-05.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200609-18.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1016791
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1017522
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.attachmate.com/techdocs/2127.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.attachmate.com/techdocs/2128.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.attachmate.com/techdocs/2137.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2006/dsa-1174
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.kb.cert.org/vuls/id/845620
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:161
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:207
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_26_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_55_ssl.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_61_opera.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openbsd.org/errata.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openoffice.org/security/cves/CVE-2006-4339.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openssl.org/news/secadv_20060905.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.opera.com/support/search/supsearch.dml?index=845
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/28549
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0661.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0062.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0072.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0073.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/445231/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/445822/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/450327/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/450327/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/489739/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/19849
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.securityfocus.com/bid/22083
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/28276
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.serv-u.com/releasenotes/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.sybase.com/detail?id=1047991
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-339-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
US Government Resource
Hyperlink: http://www.us.debian.org/security/2006/dsa-1173
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3453
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3566
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3730
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3748
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3793
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3899
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/3936
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4205
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4206
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4207
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4216
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4327
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4329
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4366
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4417
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4586
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4744
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/5146
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/0254
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/0343
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1815
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1945
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2163
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2315
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2783
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/4224
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/0905/references
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/0366
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/28755
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-1633
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-616
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

18Records found

CVE-2011-4108
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-1.70% / 81.51%
||
7 Day CHG~0.00%
Published-06 Jan, 2012 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CVE-2017-3738
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-12.32% / 93.61%
||
7 Day CHG~0.00%
Published-07 Dec, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.

Action-Not Available
Vendor-OpenSSLDebian GNU/LinuxNode.js (OpenJS Foundation)
Product-openssldebian_linuxnode.jsOpenSSL
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2014-3508
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-1.80% / 82.00%
||
7 Day CHG~0.00%
Published-13 Aug, 2014 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2014-3566
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-3.4||LOW
EPSS-93.97% / 99.88%
||
7 Day CHG-0.11%
Published-15 Oct, 2014 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

Action-Not Available
Vendor-mageian/aopenSUSERed Hat, Inc.Fedora ProjectIBM CorporationDebian GNU/LinuxNovellOracle CorporationNetBSDApple Inc.OpenSSL
Product-enterprise_linuxenterprise_linux_serverenterprise_linux_workstation_supplementaryviossuse_linux_enterprise_desktopdebian_linuxdatabasefedoraopensuseenterprise_linux_desktopenterprise_linux_server_supplementarysuse_linux_enterprise_servermageiaenterprise_linux_workstationopensslsuse_linux_enterprise_software_development_kitmac_os_xaixenterprise_linux_desktop_supplementarynetbsdn/a
CVE-2015-3197
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-24.75% / 95.93%
||
7 Day CHG~0.00%
Published-15 Feb, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.

Action-Not Available
Vendor-n/aOracle CorporationOpenSSL
Product-peoplesoft_enterprise_peopletoolsexalogic_infrastructurevm_virtualboxoss_support_toolsopenssltuxedon/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-0734
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-4.15% / 88.20%
||
7 Day CHG~0.00%
Published-30 Oct, 2018 | 12:00
Updated-16 Sep, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Timing attack against DSA

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxNode.js (OpenJS Foundation)OpenSSLNetApp, Inc.Oracle Corporation
Product-ubuntu_linuxpeoplesoft_enterprise_peopletoolstuxedocn1610opensslcloud_backupprimavera_p6_professional_project_managementmysql_enterprise_backupnode.jssnapcenterdebian_linuxsteelstoreoncommand_unified_managerstorage_automation_storee-business_suite_technology_stackcn1610_firmwareenterprise_manager_ops_centersantricity_smi-s_providerenterprise_manager_base_platformapi_gatewayOpenSSL
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2018-0735
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-6.78% / 90.93%
||
7 Day CHG~0.00%
Published-29 Oct, 2018 | 13:00
Updated-16 Sep, 2024 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Timing attack against ECDSA signature generation

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxNode.js (OpenJS Foundation)OpenSSLNetApp, Inc.Oracle Corporation
Product-ubuntu_linuxpeoplesoft_enterprise_peopletoolstuxedocn1610opensslcloud_backupelement_softwarenode.jsmysqlprimavera_p6_enterprise_project_portfolio_managementsnapdrivevm_virtualboxsmi-s_providerdebian_linuxsteelstoresecure_global_desktoponcommand_unified_managercn1610_firmwareapplication_serverenterprise_manager_ops_centersantricity_smi-s_providerenterprise_manager_base_platformapi_gatewayOpenSSL
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2018-0737
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-28.59% / 96.35%
||
7 Day CHG~0.00%
Published-16 Apr, 2018 | 17:00
Updated-17 Sep, 2024 | 03:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cache timing vulnerability in RSA Key Generation

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

Action-Not Available
Vendor-Canonical Ltd.OpenSSL
Product-ubuntu_linuxopensslOpenSSL
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2015-0285
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-3.54% / 87.21%
||
7 Day CHG~0.00%
Published-19 Mar, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CVE-2021-4160
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.21% / 42.78%
||
7 Day CHG~0.00%
Published-28 Jan, 2022 | 21:28
Updated-16 Sep, 2024 | 23:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BN_mod_exp may produce incorrect results on MIPS

There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. For the 1.0.2 release it is addressed in git commit 6fc1aaaf3 that is available to premium support customers only. It will be made available in 1.0.2zc when it is released. The issue only affects OpenSSL on MIPS platforms. Fixed in OpenSSL 3.0.1 (Affected 3.0.0). Fixed in OpenSSL 1.1.1m (Affected 1.1.1-1.1.1l). Fixed in OpenSSL 1.0.2zc-dev (Affected 1.0.2-1.0.2zb).

Action-Not Available
Vendor-Debian GNU/LinuxSiemens AGOpenSSLOracle Corporation
Product-jd_edwards_world_securityhealth_sciences_inform_publisherpeoplesoft_enterprise_peopletoolsdebian_linuxsinec_insopensslenterprise_manager_ops_centerjd_edwards_enterpriseone_toolsOpenSSL
CVE-2017-3737
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-31.23% / 96.60%
||
7 Day CHG~0.00%
Published-07 Dec, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.

Action-Not Available
Vendor-OpenSSLDebian GNU/Linux
Product-openssldebian_linuxOpenSSL
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-787
Out-of-bounds Write
CVE-2017-3732
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-3.72% / 87.51%
||
7 Day CHG~0.00%
Published-04 May, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BN_mod_exp may produce incorrect results on x86_64

There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.

Action-Not Available
Vendor-OpenSSLNode.js (OpenJS Foundation)
Product-opensslnode.jsOpenSSL
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-1968
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-3.7||LOW
EPSS-0.58% / 67.93%
||
7 Day CHG~0.00%
Published-09 Sep, 2020 | 13:50
Updated-16 Sep, 2024 | 19:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Raccoon attack

The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).

Action-Not Available
Vendor-OpenSSLOracle CorporationDebian GNU/LinuxCanonical Ltd.Fujitsu Limited
Product-ubuntu_linuxethernet_switch_es2-72peoplesoft_enterprise_peopletoolsm12-1jd_edwards_world_securityethernet_switch_tor-72_firmwareopensslm10-4s_firmwareethernet_switch_tor-72ethernet_switch_es2-64m10-4m10-4_firmwarem10-4sm12-1_firmwarem12-2sdebian_linuxethernet_switch_es1-24ethernet_switch_es2-72_firmwarem10-1_firmwareethernet_switch_es2-64_firmwarem10-1m12-2s_firmwarem12-2_firmwarem12-2ethernet_switch_es1-24_firmwareOpenSSL
CWE ID-CWE-203
Observable Discrepancy
CVE-2016-0800
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-90.15% / 99.57%
||
7 Day CHG~0.00%
Published-01 Mar, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

Action-Not Available
Vendor-n/aPulse SecureOpenSSL
Product-steel_belted_radiusopensslclientn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-1563
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-3.7||LOW
EPSS-0.97% / 75.71%
||
7 Day CHG~0.00%
Published-10 Sep, 2019 | 16:58
Updated-17 Sep, 2024 | 01:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey

In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

Action-Not Available
Vendor-OpenSSL
Product-opensslOpenSSL
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-1559
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-7.08% / 91.14%
||
7 Day CHG+0.86%
Published-27 Feb, 2019 | 23:00
Updated-17 Sep, 2024 | 04:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
0-byte record padding oracle

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).

Action-Not Available
Vendor-Canonical Ltd.Palo Alto Networks, Inc.F5, Inc.Fedora ProjectOracle CorporationTenable, Inc.Red Hat, Inc.McAfee, LLCDebian GNU/LinuxopenSUSENode.js (OpenJS Foundation)OpenSSLNetApp, Inc.
Product-communications_diameter_signaling_routercommunications_unified_session_managerubuntu_linuxbig-ip_webacceleratora320_firmwarebig-ip_application_acceleration_managerpeoplesoft_enterprise_peopletoolsopensslbig-ip_policy_enforcement_managercloud_backupfas2720threat_intelligence_exchange_servervirtualization_hostbusiness_intelligenceoncommand_unified_manager_core_packagebig-ip_local_traffic_managersantricity_smi-s_providercommunications_performance_intelligence_centeragentsnapcentersteelstore_cloud_integrated_storageontap_select_deploysmi-s_providerfas2750_firmwareontap_select_deploy_administration_utilityhci_management_nodeenterprise_linux_workstationfedoraa220traffix_signaling_delivery_controllerenterprise_linux_desktopapi_gatewaycommunications_session_routerweb_gatewayleapendeca_serverservice_processorenterprise_linuxa320big-ip_domain_name_systemmysql_workbenchsolidfirebig-ip_edge_gatewaydebian_linuxbig-iq_centralized_managementmysql_enterprise_monitorjboss_enterprise_web_serversecure_global_desktopstorage_automation_storea220_firmwaresnapprotectoncommand_unified_managermysqlenterprise_manager_base_platformenterprise_linux_serverpan-osbig-ip_fraud_protection_servicefas2720_firmwarec190services_tools_bundlestoragegridhci_compute_nodebig-ip_application_security_managernode.jssnapdrivefas2750big-ip_access_policy_managercn1610_firmwarecommunications_session_border_controllerenterprise_manager_ops_centernessusoncommand_insightjd_edwards_world_securityaltavaulta800virtualizationhyper_converged_infrastructurecn1610active_iq_unified_managerbig-ip_global_traffic_managerbig-ip_analyticsoncommand_workflow_automationelement_softwarea800_firmwarebig-ip_link_controllerdata_exchange_layerclustered_data_ontap_antivirus_connectorc190_firmwarebig-ip_advanced_firewall_managerjd_edwards_enterpriseone_toolsOpenSSL
CWE ID-CWE-203
Observable Discrepancy
CVE-2016-0704
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-4.80% / 89.06%
||
7 Day CHG~0.00%
Published-02 Mar, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-0703
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-3.39% / 86.91%
||
7 Day CHG~0.00%
Published-02 Mar, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Details not found