Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-4343

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-28 Sep, 2006 | 18:00
Updated At-07 Aug, 2024 | 19:06
Rejected At-
Credits

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:28 Sep, 2006 | 18:00
Updated At:07 Aug, 2024 | 19:06
Rejected At:
▼CVE Numbering Authority (CNA)

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:172
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/22212
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4750
vdb-entry
x_refsource_VUPEN
https://www.exploit-db.com/exploits/4773
exploit
x_refsource_EXPLOIT-DB
http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
x_refsource_CONFIRM
http://secunia.com/advisories/23915
third-party-advisory
x_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
vendor-advisory
x_refsource_HP
http://securitytracker.com/id?1016943
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/23038
third-party-advisory
x_refsource_SECUNIA
http://www.trustix.org/errata/2006/0054
vendor-advisory
x_refsource_TRUSTIX
https://exchange.xforce.ibmcloud.com/vulnerabilities/29240
vdb-entry
x_refsource_XF
http://www.debian.org/security/2006/dsa-1195
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/23309
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/4401
vdb-entry
x_refsource_VUPEN
http://www.ubuntu.com/usn/usn-353-1
vendor-advisory
x_refsource_UBUNTU
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
x_refsource_CONFIRM
http://secunia.com/advisories/22116
third-party-advisory
x_refsource_SECUNIA
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/22166
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-0695.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/23340
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22385
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_24_sr.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/22758
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22487
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_58_openssl.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/22772
third-party-advisory
x_refsource_SECUNIA
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
vendor-advisory
x_refsource_HP
http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc
vendor-advisory
x_refsource_FREEBSD
http://secunia.com/advisories/22165
third-party-advisory
x_refsource_SECUNIA
http://docs.info.apple.com/article.html?artnum=304829
x_refsource_CONFIRM
http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html
mailing-list
x_refsource_FULLDISC
http://secunia.com/advisories/23794
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=130497311408250&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/22220
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
http://openvpn.net/changelog.html
x_refsource_CONFIRM
http://www.vmware.com/support/server/doc/releasenotes_server.html
x_refsource_CONFIRM
http://secunia.com/advisories/25889
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4036
vdb-entry
x_refsource_VUPEN
http://openbsd.org/errata.html#openssl2
vendor-advisory
x_refsource_OPENBSD
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
x_refsource_CONFIRM
http://secunia.com/advisories/30124
third-party-advisory
x_refsource_SECUNIA
http://www.ingate.com/relnote-452.php
x_refsource_CONFIRM
http://secunia.com/advisories/22626
third-party-advisory
x_refsource_SECUNIA
http://www.osvdb.org/29263
vdb-entry
x_refsource_OSVDB
http://www.securityfocus.com/bid/22083
vdb-entry
x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
vendor-advisory
x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2006/3869
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22544
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22298
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
x_refsource_CONFIRM
http://secunia.com/advisories/22130
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/25420
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31492
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1973
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22284
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4356
vdb-entry
signature
x_refsource_OVAL
http://www.redhat.com/support/errata/RHSA-2008-0629.html
vendor-advisory
x_refsource_REDHAT
http://security.gentoo.org/glsa/glsa-200610-11.xml
vendor-advisory
x_refsource_GENTOO
http://issues.rpath.com/browse/RPL-613
x_refsource_CONFIRM
http://secunia.com/advisories/26329
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22260
third-party-advisory
x_refsource_SECUNIA
http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/0343
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/3860
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/23280
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/447318/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10207
vdb-entry
signature
x_refsource_OVAL
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://www.vmware.com/support/player/doc/releasenotes_player.html
x_refsource_CONFIRM
http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/4264
vdb-entry
x_refsource_VUPEN
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
x_refsource_CONFIRM
http://secunia.com/advisories/22193
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
x_refsource_CONFIRM
http://secunia.com/advisories/23155
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22799
third-party-advisory
x_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946
vendor-advisory
x_refsource_SLACKWARE
http://www.vupen.com/english/advisories/2006/4417
vdb-entry
x_refsource_VUPEN
http://www.kb.cert.org/vuls/id/386964
third-party-advisory
x_refsource_CERT-VN
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=130497311408250&w=2
vendor-advisory
x_refsource_HP
http://www.serv-u.com/releasenotes/
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/4443
vdb-entry
x_refsource_VUPEN
http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
x_refsource_CONFIRM
http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
x_refsource_CONFIRM
http://secunia.com/advisories/22094
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22186
third-party-advisory
x_refsource_SECUNIA
http://www.openssl.org/news/secadv_20060928.txt
x_refsource_CONFIRM
http://kolab.org/security/kolab-vendor-notice-11.txt
x_refsource_CONFIRM
http://secunia.com/advisories/22500
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
vendor-advisory
x_refsource_APPLE
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
third-party-advisory
x_refsource_CERT
http://www.securityfocus.com/archive/1/489739/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/22216
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3820
vdb-entry
x_refsource_VUPEN
http://lists.vmware.com/pipermail/security-announce/2008/000008.html
mailing-list
x_refsource_MLIST
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
vendor-advisory
x_refsource_HP
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html
vendor-advisory
x_refsource_OPENPKG
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/0905/references
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/1401
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1
vendor-advisory
x_refsource_SUNALERT
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc
vendor-advisory
x_refsource_NETBSD
http://www.vmware.com/security/advisories/VMSA-2008-0005.html
x_refsource_CONFIRM
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
vendor-advisory
x_refsource_HP
http://www.securityfocus.com/archive/1/456546/100/200/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/447393/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/3936
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22240
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22330
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://www.debian.org/security/2006/dsa-1185
vendor-advisory
x_refsource_DEBIAN
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
vendor-advisory
x_refsource_SGI
http://secunia.com/advisories/22207
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
vendor-advisory
x_refsource_MANDRIVA
http://securitytracker.com/id?1017522
vdb-entry
x_refsource_SECTRACK
http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
vendor-advisory
x_refsource_CISCO
http://www.vupen.com/english/advisories/2006/3902
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2007/2783
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/22259
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22460
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22791
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22172
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
x_refsource_CONFIRM
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
vendor-advisory
x_refsource_HP
http://www.securityfocus.com/bid/28276
vdb-entry
x_refsource_BID
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1
vendor-advisory
x_refsource_SUNALERT
http://www.securityfocus.com/bid/20246
vdb-entry
x_refsource_BID
http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
vendor-advisory
x_refsource_CISCO
http://secunia.com/advisories/24950
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:172
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/22212
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://www.exploit-db.com/exploits/4773
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/23915
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://securitytracker.com/id?1016943
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/23038
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.trustix.org/errata/2006/0054
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29240
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.debian.org/security/2006/dsa-1195
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/23309
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/4401
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.ubuntu.com/usn/usn-353-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22116
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/22166
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0695.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/23340
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22385
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/linux/security/advisories/2006_24_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/22758
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22487
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/linux/security/advisories/2006_58_openssl.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/22772
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: http://secunia.com/advisories/22165
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://secunia.com/advisories/23794
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/22220
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://openvpn.net/changelog.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/25889
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/4036
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://openbsd.org/errata.html#openssl2
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30124
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ingate.com/relnote-452.php
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22626
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.osvdb.org/29263
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.securityfocus.com/bid/22083
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.vupen.com/english/advisories/2006/3869
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22544
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22298
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22130
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/25420
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31492
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/1973
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22284
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4356
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://security.gentoo.org/glsa/glsa-200610-11.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://issues.rpath.com/browse/RPL-613
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/26329
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22260
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2007/0343
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2006/3860
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/23280
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/447318/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10207
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/4264
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22193
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/23155
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22799
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://www.vupen.com/english/advisories/2006/4417
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.kb.cert.org/vuls/id/386964
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.serv-u.com/releasenotes/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2006/4443
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22094
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22186
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.openssl.org/news/secadv_20060928.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://kolab.org/security/kolab-vendor-notice-11.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22500
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://www.securityfocus.com/archive/1/489739/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/22216
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/3820
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000008.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html
Resource:
vendor-advisory
x_refsource_OPENPKG
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/0905/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0005.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.securityfocus.com/archive/1/447393/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.vupen.com/english/advisories/2006/3936
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22240
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22330
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.debian.org/security/2006/dsa-1185
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
Hyperlink: http://secunia.com/advisories/22207
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://securitytracker.com/id?1017522
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://www.vupen.com/english/advisories/2006/3902
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2007/2783
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/22259
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22460
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22791
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22172
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securityfocus.com/bid/28276
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://www.securityfocus.com/bid/20246
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://secunia.com/advisories/24950
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1
Resource:
vendor-advisory
x_refsource_SUNALERT
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:172
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/22212
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/4750
vdb-entry
x_refsource_VUPEN
x_transferred
https://www.exploit-db.com/exploits/4773
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/23915
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
vendor-advisory
x_refsource_HP
x_transferred
http://securitytracker.com/id?1016943
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/23038
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.trustix.org/errata/2006/0054
vendor-advisory
x_refsource_TRUSTIX
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/29240
vdb-entry
x_refsource_XF
x_transferred
http://www.debian.org/security/2006/dsa-1195
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/23309
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/4401
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.ubuntu.com/usn/usn-353-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22116
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
x_refsource_CONFIRM
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/22166
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0695.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/23340
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22385
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/linux/security/advisories/2006_24_sr.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/22758
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22487
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/linux/security/advisories/2006_58_openssl.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/22772
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
vendor-advisory
x_refsource_HP
x_transferred
http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
http://secunia.com/advisories/22165
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://docs.info.apple.com/article.html?artnum=304829
x_refsource_CONFIRM
x_transferred
http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://secunia.com/advisories/23794
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=130497311408250&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/22220
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://openvpn.net/changelog.html
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/server/doc/releasenotes_server.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/25889
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/4036
vdb-entry
x_refsource_VUPEN
x_transferred
http://openbsd.org/errata.html#openssl2
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30124
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ingate.com/relnote-452.php
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22626
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.osvdb.org/29263
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.securityfocus.com/bid/22083
vdb-entry
x_refsource_BID
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.vupen.com/english/advisories/2006/3869
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22544
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22298
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22130
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/25420
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31492
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/1973
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22284
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4356
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0629.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://security.gentoo.org/glsa/glsa-200610-11.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://issues.rpath.com/browse/RPL-613
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/26329
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22260
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2007/0343
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2006/3860
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/23280
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/447318/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10207
vdb-entry
signature
x_refsource_OVAL
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://www.vmware.com/support/player/doc/releasenotes_player.html
x_refsource_CONFIRM
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/4264
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22193
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/23155
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22799
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://www.vupen.com/english/advisories/2006/4417
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.kb.cert.org/vuls/id/386964
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=130497311408250&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.serv-u.com/releasenotes/
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2006/4443
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22094
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22186
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.openssl.org/news/secadv_20060928.txt
x_refsource_CONFIRM
x_transferred
http://kolab.org/security/kolab-vendor-notice-11.txt
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22500
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://www.securityfocus.com/archive/1/489739/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/22216
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/3820
vdb-entry
x_refsource_VUPEN
x_transferred
http://lists.vmware.com/pipermail/security-announce/2008/000008.html
mailing-list
x_refsource_MLIST
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
vendor-advisory
x_refsource_HP
x_transferred
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html
vendor-advisory
x_refsource_OPENPKG
x_transferred
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/0905/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2007/1401
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc
vendor-advisory
x_refsource_NETBSD
x_transferred
http://www.vmware.com/security/advisories/VMSA-2008-0005.html
x_refsource_CONFIRM
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
vendor-advisory
x_refsource_HP
x_transferred
http://www.securityfocus.com/archive/1/456546/100/200/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.securityfocus.com/archive/1/447393/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.vupen.com/english/advisories/2006/3936
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22240
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22330
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://www.debian.org/security/2006/dsa-1185
vendor-advisory
x_refsource_DEBIAN
x_transferred
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
vendor-advisory
x_refsource_SGI
x_transferred
http://secunia.com/advisories/22207
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://securitytracker.com/id?1017522
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
vendor-advisory
x_refsource_CISCO
x_transferred
http://www.vupen.com/english/advisories/2006/3902
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2007/2783
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/22259
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22460
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22791
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22172
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
x_refsource_CONFIRM
x_transferred
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
vendor-advisory
x_refsource_HP
x_transferred
http://www.securityfocus.com/bid/28276
vdb-entry
x_refsource_BID
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://www.securityfocus.com/bid/20246
vdb-entry
x_refsource_BID
x_transferred
http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
vendor-advisory
x_refsource_CISCO
x_transferred
http://secunia.com/advisories/24950
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:172
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/22212
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/4773
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/23915
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://securitytracker.com/id?1016943
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/23038
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.trustix.org/errata/2006/0054
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29240
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1195
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/23309
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4401
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-353-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22116
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/22166
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0695.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/23340
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22385
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_24_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/22758
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22487
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_58_openssl.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/22772
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: http://secunia.com/advisories/22165
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://secunia.com/advisories/23794
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/22220
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://openvpn.net/changelog.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/25889
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4036
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://openbsd.org/errata.html#openssl2
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30124
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ingate.com/relnote-452.php
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22626
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.osvdb.org/29263
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.securityfocus.com/bid/22083
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3869
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22544
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22298
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22130
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/25420
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31492
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/1973
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22284
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4356
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200610-11.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://issues.rpath.com/browse/RPL-613
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/26329
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22260
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/0343
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3860
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/23280
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/447318/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10207
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4264
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22193
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/23155
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22799
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4417
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/386964
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.serv-u.com/releasenotes/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4443
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22094
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22186
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.openssl.org/news/secadv_20060928.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://kolab.org/security/kolab-vendor-notice-11.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22500
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/489739/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/22216
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3820
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000008.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html
Resource:
vendor-advisory
x_refsource_OPENPKG
x_transferred
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/0905/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0005.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/447393/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3936
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22240
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22330
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1185
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
x_transferred
Hyperlink: http://secunia.com/advisories/22207
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://securitytracker.com/id?1017522
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3902
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2783
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/22259
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22460
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22791
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22172
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securityfocus.com/bid/28276
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://www.securityfocus.com/bid/20246
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://secunia.com/advisories/24950
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:28 Sep, 2006 | 18:07
Updated At:17 Oct, 2018 | 21:36

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CPE Matches

OpenSSL
openssl
>>openssl>>0.9.7
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7a
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7b
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7c
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7d
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7e
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7f
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7g
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7h
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7i
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7j
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.7k
cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.8
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.8a
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.8b
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>0.9.8c
cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>3.1
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>5.04
cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>5.10
cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>6.06
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
Weaknesses
CWE IDTypeSource
CWE-476Primarynvd@nist.gov
CWE ID: CWE-476
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

This vulnerability is addressed in the following product releases: OpenSSL Project, OpenSSL, 0.9.7l (or later) OpenSSL Project, OpenSSL, 0.9.8d (or later)

Vendor Statements

Organization : Red Hat
Last Modified : 2007-03-14T00:00:00

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References
HyperlinkSourceResource
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.ascsecalert@redhat.com
Third Party Advisory
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.ascsecalert@redhat.com
Third Party Advisory
http://docs.info.apple.com/article.html?artnum=304829secalert@redhat.com
Third Party Advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771secalert@redhat.com
Broken Link
http://issues.rpath.com/browse/RPL-613secalert@redhat.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100secalert@redhat.com
Broken Link
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540secalert@redhat.com
Broken Link
http://kolab.org/security/kolab-vendor-notice-11.txtsecalert@redhat.com
Broken Link
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.htmlsecalert@redhat.com
Mailing List
Third Party Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.htmlsecalert@redhat.com
Mailing List
Third Party Advisory
http://lists.vmware.com/pipermail/security-announce/2008/000008.htmlsecalert@redhat.com
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=130497311408250&w=2secalert@redhat.com
Mailing List
Third Party Advisory
http://openbsd.org/errata.html#openssl2secalert@redhat.com
Third Party Advisory
http://openvpn.net/changelog.htmlsecalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22094secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22116secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22130secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22165secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22166secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22172secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22186secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22193secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22207secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22212secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22216secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22220secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22240secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22259secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22260secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22284secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22298secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22330secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22385secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22460secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22487secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22500secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22544secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22626secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22758secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22772secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22791secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/22799secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/23038secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/23155secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/23280secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/23309secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/23340secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/23680secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/23794secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/23915secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/24950secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/25420secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/25889secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/26329secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/30124secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/31492secalert@redhat.com
Third Party Advisory
http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.ascsecalert@redhat.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200610-11.xmlsecalert@redhat.com
Third Party Advisory
http://securitytracker.com/id?1016943secalert@redhat.com
Third Party Advisory
VDB Entry
http://securitytracker.com/id?1017522secalert@redhat.com
Third Party Advisory
VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946secalert@redhat.com
Mailing List
Third Party Advisory
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227secalert@redhat.com
Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1secalert@redhat.com
Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1secalert@redhat.com
Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1secalert@redhat.com
Broken Link
http://support.avaya.com/elmodocs2/security/ASA-2006-220.htmsecalert@redhat.com
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-260.htmsecalert@redhat.com
Third Party Advisory
http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.htmlsecalert@redhat.com
Third Party Advisory
http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtmlsecalert@redhat.com
Third Party Advisory
http://www.debian.org/security/2006/dsa-1185secalert@redhat.com
Third Party Advisory
http://www.debian.org/security/2006/dsa-1195secalert@redhat.com
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200612-11.xmlsecalert@redhat.com
Third Party Advisory
http://www.ingate.com/relnote-452.phpsecalert@redhat.com
Broken Link
http://www.kb.cert.org/vuls/id/386964secalert@redhat.com
Patch
Third Party Advisory
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:172secalert@redhat.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:177secalert@redhat.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:178secalert@redhat.com
Broken Link
http://www.novell.com/linux/security/advisories/2006_24_sr.htmlsecalert@redhat.com
Broken Link
http://www.novell.com/linux/security/advisories/2006_58_openssl.htmlsecalert@redhat.com
Broken Link
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.htmlsecalert@redhat.com
Third Party Advisory
http://www.openssl.org/news/secadv_20060928.txtsecalert@redhat.com
Patch
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.htmlsecalert@redhat.com
Third Party Advisory
http://www.osvdb.org/29263secalert@redhat.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2006-0695.htmlsecalert@redhat.com
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0629.htmlsecalert@redhat.com
Third Party Advisory
http://www.securityfocus.com/archive/1/447318/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/447393/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/456546/100/200/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/489739/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/20246secalert@redhat.com
Patch
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/22083secalert@redhat.com
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/28276secalert@redhat.com
Third Party Advisory
VDB Entry
http://www.serv-u.com/releasenotes/secalert@redhat.com
Third Party Advisory
http://www.trustix.org/errata/2006/0054secalert@redhat.com
Broken Link
http://www.ubuntu.com/usn/usn-353-1secalert@redhat.com
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA06-333A.htmlsecalert@redhat.com
Third Party Advisory
US Government Resource
http://www.vmware.com/security/advisories/VMSA-2008-0005.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/support/player/doc/releasenotes_player.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/support/player2/doc/releasenotes_player2.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/support/server/doc/releasenotes_server.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.htmlsecalert@redhat.com
Third Party Advisory
http://www.vupen.com/english/advisories/2006/3820secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2006/3860secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2006/3869secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2006/3902secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2006/3936secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2006/4036secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2006/4264secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2006/4401secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2006/4417secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2006/4443secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2006/4750secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2007/0343secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2007/1401secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2007/1973secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2007/2783secalert@redhat.com
Permissions Required
Third Party Advisory
http://www.vupen.com/english/advisories/2008/0905/referencessecalert@redhat.com
Permissions Required
Third Party Advisory
http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdfsecalert@redhat.com
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/29240secalert@redhat.com
VDB Entry
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10207secalert@redhat.com
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4356secalert@redhat.com
Third Party Advisory
https://www.exploit-db.com/exploits/4773secalert@redhat.com
Third Party Advisory
VDB Entry
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144secalert@redhat.com
Broken Link
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://issues.rpath.com/browse/RPL-613
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://kolab.org/security/kolab-vendor-notice-11.txt
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.vmware.com/pipermail/security-announce/2008/000008.html
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=130497311408250&w=2
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://openbsd.org/errata.html#openssl2
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://openvpn.net/changelog.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22094
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22116
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22130
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22165
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22166
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22172
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22186
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22193
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22207
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22212
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22216
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22220
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22240
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22259
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22260
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22284
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22298
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22330
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22385
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22460
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22487
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22500
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22544
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22626
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22758
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22772
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22791
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22799
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/23038
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/23155
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/23280
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/23309
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/23340
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/23680
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/23794
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/23915
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/24950
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/25420
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/25889
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/26329
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/30124
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/31492
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://security.gentoo.org/glsa/glsa-200610-11.xml
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://securitytracker.com/id?1016943
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://securitytracker.com/id?1017522
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2006/dsa-1185
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2006/dsa-1195
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.ingate.com/relnote-452.php
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.kb.cert.org/vuls/id/386964
Source: secalert@redhat.com
Resource:
Patch
Third Party Advisory
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:172
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.novell.com/linux/security/advisories/2006_24_sr.html
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.novell.com/linux/security/advisories/2006_58_openssl.html
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.openssl.org/news/secadv_20060928.txt
Source: secalert@redhat.com
Resource:
Patch
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.osvdb.org/29263
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0695.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/archive/1/447318/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/447393/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/489739/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/20246
Source: secalert@redhat.com
Resource:
Patch
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/22083
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/28276
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.serv-u.com/releasenotes/
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.trustix.org/errata/2006/0054
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.ubuntu.com/usn/usn-353-1
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0005.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2006/3820
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2006/3860
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2006/3869
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2006/3902
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2006/3936
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2006/4036
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2006/4264
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2006/4401
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2006/4417
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2006/4443
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2007/0343
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2007/1973
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2007/2783
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/0905/references
Source: secalert@redhat.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29240
Source: secalert@redhat.com
Resource:
VDB Entry
Third Party Advisory
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10207
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4356
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://www.exploit-db.com/exploits/4773
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Source: secalert@redhat.com
Resource:
Broken Link

Change History

0
Information is not available yet

Similar CVEs

1824Records found

CVE-2015-7852
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-3.54% / 87.20%
||
7 Day CHG~0.00%
Published-07 Aug, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.

Action-Not Available
Vendor-ntpn/aDebian GNU/LinuxRed Hat, Inc.Oracle CorporationNetApp, Inc.
Product-oncommand_unified_manageroncommand_performance_manageroncommand_balancelinuxenterprise_linux_desktopenterprise_linux_server_ausenterprise_linux_server_tusenterprise_linux_workstationclustered_data_ontapenterprise_linux_server_eusdebian_linuxenterprise_linux_serverntpdata_ontapn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-21285
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 32.31%
||
7 Day CHG-0.02%
Published-02 Feb, 2021 | 17:55
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Docker daemon crash during image pull of malicious image

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

Action-Not Available
Vendor-mobyNetApp, Inc.Debian GNU/LinuxDocker, Inc.
Product-dockerdebian_linuxe-series_santricity_os_controllermoby
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2018-19478
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.68% / 70.68%
||
7 Day CHG~0.00%
Published-02 Jan, 2019 | 18:00
Updated-05 Aug, 2024 | 11:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Artifex Ghostscript before 9.26, a carefully crafted PDF file can trigger an extremely long running computation when parsing the file.

Action-Not Available
Vendor-n/aDebian GNU/LinuxArtifex Software Inc.
Product-debian_linuxghostscriptn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2019-15531
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-1.11% / 77.22%
||
7 Day CHG~0.00%
Published-23 Aug, 2019 | 16:03
Updated-05 Aug, 2024 | 00:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c.

Action-Not Available
Vendor-n/aDebian GNU/LinuxGNUFedora Project
Product-libextractordebian_linuxfedoran/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-19108
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.41% / 60.57%
||
7 Day CHG-0.01%
Published-08 Nov, 2018 | 00:00
Updated-05 Aug, 2024 | 11:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Exiv2 0.26, Exiv2::PsdImage::readMetadata in psdimage.cpp in the PSD image reader may suffer from a denial of service (infinite loop) caused by an integer overflow via a crafted PSD image file.

Action-Not Available
Vendor-n/aCanonical Ltd.Exiv2Red Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxexiv2debian_linuxenterprise_linux_workstationenterprise_linux_desktopn/a
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2010-0433
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-10.53% / 92.96%
||
7 Day CHG~0.00%
Published-05 Mar, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-21375
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-2.31% / 84.14%
||
7 Day CHG~0.00%
Published-10 Mar, 2021 | 22:30
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crash in receiving updated SDP answer after initial SDP negotiation failed

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP version 2.10 and earlier, after an initial INVITE has been sent, when two 183 responses are received, with the first one causing negotiation failure, a crash will occur. This results in a denial of service.

Action-Not Available
Vendor-teluupjsipDebian GNU/Linux
Product-debian_linuxpjsippjproject
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2010-0207
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-5.5||MEDIUM
EPSS-0.44% / 62.44%
||
7 Day CHG~0.00%
Published-30 Oct, 2019 | 20:46
Updated-07 Aug, 2024 | 00:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In xpdf, the xref table contains an infinite loop which allows remote attackers to cause a denial of service (application crash) in xpdf-based PDF viewers.

Action-Not Available
Vendor-xpdfreaderpopplerDebian GNU/Linux
Product-xpdfdebian_linuxpoppler
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2010-0205
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-4.3||MEDIUM
EPSS-8.13% / 91.83%
||
7 Day CHG~0.00%
Published-03 Mar, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.

Action-Not Available
Vendor-libpngn/aSUSEDebian GNU/LinuxCanonical Ltd.Fedora ProjectopenSUSEApple Inc.
Product-ubuntu_linuxfedoraopensusedebian_linuxlinux_enterprise_serverlibpngmac_os_xn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2018-18897
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 41.85%
||
7 Day CHG~0.00%
Published-02 Nov, 2018 | 06:00
Updated-05 Aug, 2024 | 11:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Poppler 0.71.0. There is a memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc, as demonstrated by pdftocairo.

Action-Not Available
Vendor-n/aDebian GNU/LinuxRed Hat, Inc.Canonical Ltd.freedesktop.org
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_server_ausenterprise_linux_workstationenterprise_linuxenterprise_linux_eusenterprise_linux_server_tusenterprise_linux_desktoppopplern/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2015-4652
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.42% / 61.18%
||
7 Day CHG~0.00%
Published-22 Jul, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

epan/dissectors/packet-gsm_a_dtap.c in the GSM DTAP dissector in Wireshark 1.12.x before 1.12.6 does not properly validate digit characters, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the de_emerg_num_list and de_bcd_num functions.

Action-Not Available
Vendor-n/aWireshark FoundationDebian GNU/Linux
Product-wiresharkdebian_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-5262
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.95% / 75.41%
||
7 Day CHG~0.00%
Published-27 Oct, 2015 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.

Action-Not Available
Vendor-n/aThe Apache Software FoundationFedora ProjectCanonical Ltd.
Product-fedoraubuntu_linuxhttpclientn/a
CVE-2019-13223
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 28.06%
||
7 Day CHG~0.00%
Published-15 Aug, 2019 | 00:00
Updated-04 Aug, 2024 | 23:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A reachable assertion in the lookup1_values function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.

Action-Not Available
Vendor-stb_vorbis_projectn/aDebian GNU/Linux
Product-debian_linuxstb_vorbisn/a
CWE ID-CWE-617
Reachable Assertion
CVE-2019-13311
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.18% / 39.32%
||
7 Day CHG~0.00%
Published-05 Jul, 2019 | 00:54
Updated-04 Aug, 2024 | 23:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.

Action-Not Available
Vendor-n/aImageMagick Studio LLCDebian GNU/LinuxopenSUSECanonical Ltd.
Product-ubuntu_linuxdebian_linuximagemagickleapn/a
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2015-5523
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-4.27% / 88.39%
||
7 Day CHG~0.00%
Published-11 Aug, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving multiple whitespace characters before an empty href, which triggers a large memory allocation.

Action-Not Available
Vendor-n/aCanonical Ltd.HTML Tidy Advocacy Community Group (“HTACG”)Apple Inc.Debian GNU/Linux
Product-watchosubuntu_linuxtidydebian_linuxiphone_osmac_os_xn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-19107
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.30% / 53.04%
||
7 Day CHG-0.01%
Published-08 Nov, 2018 | 00:00
Updated-05 Aug, 2024 | 11:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Exiv2 0.26, Exiv2::IptcParser::decode in iptc.cpp (called from psdimage.cpp in the PSD image reader) may suffer from a denial of service (heap-based buffer over-read) caused by an integer overflow via a crafted PSD image file.

Action-Not Available
Vendor-n/aCanonical Ltd.Exiv2Red Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxexiv2debian_linuxenterprise_linux_workstationenterprise_linux_desktopn/a
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2019-12975
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 26.61%
||
7 Day CHG~0.00%
Published-26 Jun, 2019 | 17:08
Updated-04 Aug, 2024 | 23:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.

Action-Not Available
Vendor-n/aImageMagick Studio LLCDebian GNU/LinuxopenSUSECanonical Ltd.
Product-ubuntu_linuxdebian_linuximagemagickleapn/a
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2018-19539
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-1.03% / 76.38%
||
7 Day CHG~0.00%
Published-26 Nov, 2018 | 03:00
Updated-05 Aug, 2024 | 11:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in JasPer 2.0.14. There is an access violation in the function jas_image_readcmpt in libjasper/base/jas_image.c, leading to a denial of service.

Action-Not Available
Vendor-n/aSUSEopenSUSEJasPerDebian GNU/Linux
Product-linux_enterprise_serverdebian_linuxlinux_enterprise_desktopjasperleapn/a
CWE ID-CWE-617
Reachable Assertion
CVE-2014-3480
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-12.04% / 93.53%
||
7 Day CHG~0.00%
Published-09 Jul, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.

Action-Not Available
Vendor-file_projectn/aopenSUSEThe PHP GroupDebian GNU/LinuxOracle Corporation
Product-opensusefilephpdebian_linuxlinuxn/a
CVE-2018-16066
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-1.50% / 80.36%
||
7 Day CHG~0.00%
Published-09 Jan, 2019 | 19:00
Updated-05 Aug, 2024 | 10:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use after free in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Action-Not Available
Vendor-Red Hat, Inc.Google LLCDebian GNU/Linux
Product-enterprise_linux_serverdebian_linuxchromeenterprise_linux_workstationenterprise_linux_desktopChrome
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2014-3479
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-12.04% / 93.53%
||
7 Day CHG~0.00%
Published-09 Jul, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.

Action-Not Available
Vendor-file_projectn/aopenSUSEThe PHP GroupDebian GNU/LinuxOracle Corporation
Product-opensusefilephpdebian_linuxlinuxn/a
CVE-2015-3196
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-5.68% / 90.04%
||
7 Day CHG~0.00%
Published-06 Dec, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.

Action-Not Available
Vendor-n/aRed Hat, Inc.Fedora ProjectOpenSSLCanonical Ltd.Debian GNU/LinuxOracle CorporationHP Inc.
Product-enterprise_linux_serverenterprise_linux_server_ausdebian_linuxvm_virtualboxfedoraenterprise_linux_desktopubuntu_linuxicewall_sso_agent_optionenterprise_linux_server_eusenterprise_linux_server_tusenterprise_linux_workstationopensslicewall_sson/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2018-19535
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.36% / 57.74%
||
7 Day CHG~0.00%
Published-26 Nov, 2018 | 00:00
Updated-05 Aug, 2024 | 11:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Exiv2 0.26 and previous versions, PngChunk::readRawProfile in pngchunk_int.cpp may cause a denial of service (application crash due to a heap-based buffer over-read) via a crafted PNG file.

Action-Not Available
Vendor-n/aCanonical Ltd.Exiv2Red Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxexiv2debian_linuxenterprise_linux_workstationenterprise_linux_desktopn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-19058
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.27% / 49.98%
||
7 Day CHG-0.00%
Published-07 Nov, 2018 | 16:00
Updated-05 Aug, 2024 | 11:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Poppler 0.71.0. There is a reachable abort in Object.h, will lead to denial of service because EmbFile::save2 in FileSpec.cc lacks a stream check before saving an embedded file.

Action-Not Available
Vendor-n/aDebian GNU/LinuxRed Hat, Inc.Canonical Ltd.freedesktop.org
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_workstationenterprise_linux_desktoppopplern/a
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2019-12213
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.30% / 52.95%
||
7 Day CHG~0.00%
Published-20 May, 2019 | 15:05
Updated-04 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When FreeImage 3.18.0 reads a special TIFF file, the TIFFReadDirectory function in PluginTIFF.cpp always returns 1, leading to stack exhaustion.

Action-Not Available
Vendor-freeimage_projectn/aCanonical Ltd.Fedora ProjectDebian GNU/Linux
Product-freeimageubuntu_linuxdebian_linuxfedoran/a
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2018-18520
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.78% / 72.84%
||
7 Day CHG~0.00%
Published-19 Oct, 2018 | 17:00
Updated-05 Aug, 2024 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.

Action-Not Available
Vendor-elfutils_projectn/aCanonical Ltd.Red Hat, Inc.openSUSEDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxelfutilsenterprise_linux_workstationenterprise_linux_desktopleapn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-18409
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.34% / 55.80%
||
7 Day CHG~0.00%
Published-17 Oct, 2018 | 04:00
Updated-05 Aug, 2024 | 11:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leading to denial of service during an address_histogram call or a get_histogram call.

Action-Not Available
Vendor-digitalcorporan/aCanonical Ltd.Fedora Project
Product-ubuntu_linuxtcpflowfedoran/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2014-3487
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-5.95% / 90.30%
||
7 Day CHG-9.26%
Published-09 Jul, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.

Action-Not Available
Vendor-file_projectn/aopenSUSEThe PHP GroupDebian GNU/LinuxOracle Corporation
Product-opensusefilephpdebian_linuxlinuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-19139
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.48% / 64.27%
||
7 Day CHG-0.01%
Published-09 Nov, 2018 | 21:00
Updated-05 Aug, 2024 | 11:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue has been found in JasPer 2.0.14. There is a memory leak in jas_malloc.c when called from jpc_unk_getparms in jpc_cs.c.

Action-Not Available
Vendor-n/aJasPerDebian GNU/LinuxRed Hat, Inc.
Product-jasperdebian_linuxfedoran/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2018-19059
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 33.06%
||
7 Day CHG-0.00%
Published-07 Nov, 2018 | 16:00
Updated-05 Aug, 2024 | 11:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Poppler 0.71.0. There is a out-of-bounds read in EmbFile::save2 in FileSpec.cc, will lead to denial of service, as demonstrated by utils/pdfdetach.cc not validating embedded files before save attempts.

Action-Not Available
Vendor-n/afreedesktop.orgCanonical Ltd.
Product-ubuntu_linuxpopplern/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2015-3336
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.89% / 74.63%
||
7 Day CHG~0.00%
Published-19 Apr, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Google Chrome before 42.0.2311.90 does not always ask the user before proceeding with CONTENT_SETTINGS_TYPE_FULLSCREEN and CONTENT_SETTINGS_TYPE_MOUSELOCK changes, which allows user-assisted remote attackers to cause a denial of service (UI disruption) by constructing a crafted HTML document containing JavaScript code with requestFullScreen and requestPointerLock calls, and arranging for the user to access this document with a file: URL.

Action-Not Available
Vendor-n/aGoogle LLCDebian GNU/LinuxopenSUSE
Product-debian_linuxopensusechromen/a
CVE-2018-18025
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.42% / 61.03%
||
7 Day CHG~0.00%
Published-07 Oct, 2018 | 18:00
Updated-05 Aug, 2024 | 11:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the EncodeImage function of coders/pict.c, which allows attackers to cause a denial of service via a crafted SVG image file.

Action-Not Available
Vendor-n/aDebian GNU/LinuxImageMagick Studio LLC
Product-debian_linuximagemagickn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2015-3216
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-1.17% / 77.82%
||
7 Day CHG~0.00%
Published-07 Jul, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.

Action-Not Available
Vendor-n/aRed Hat, Inc.OpenSSL
Product-enterprise_linuxopenssln/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2018-17581
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.22% / 45.12%
||
7 Day CHG~0.00%
Published-28 Sep, 2018 | 00:00
Updated-05 Aug, 2024 | 10:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a recursive function, leading to Denial of service.

Action-Not Available
Vendor-n/aCanonical Ltd.Exiv2Red Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxexiv2debian_linuxenterprise_linux_workstationenterprise_linux_desktopn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2018-17470
Matching Score-8
Assigner-Chrome
ShareView Details
Matching Score-8
Assigner-Chrome
CVSS Score-7.4||HIGH
EPSS-1.74% / 81.74%
||
7 Day CHG~0.00%
Published-09 Jan, 2019 | 19:00
Updated-05 Aug, 2024 | 10:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap buffer overflow in GPU in Google Chrome prior to 70.0.3538.67 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

Action-Not Available
Vendor-Red Hat, Inc.Google LLCDebian GNU/Linux
Product-enterprise_linux_serverdebian_linuxchromeenterprise_linux_workstationenterprise_linux_desktopChrome
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-2776
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-2.01% / 82.95%
||
7 Day CHG~0.00%
Published-31 Mar, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The parse_SST function in FreeXL before 1.0.0i allows remote attackers to cause a denial of service (memory consumption) via a crafted shared strings table in a workbook.

Action-Not Available
Vendor-gaia-gisn/aDebian GNU/Linux
Product-debian_linuxfreexln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2019-1010315
Matching Score-8
Assigner-7556d962-6fb7-411e-85fa-6cd62f095ba8
ShareView Details
Matching Score-8
Assigner-7556d962-6fb7-411e-85fa-6cd62f095ba8
CVSS Score-5.5||MEDIUM
EPSS-0.62% / 69.25%
||
7 Day CHG~0.00%
Published-11 Jul, 2019 | 19:34
Updated-05 Aug, 2024 | 03:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.

Action-Not Available
Vendor-wavpackWavPackCanonical Ltd.Fedora ProjectDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxfedorawavpackWavPack
CWE ID-CWE-369
Divide By Zero
CVE-2021-20176
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 20.96%
||
7 Day CHG~0.00%
Published-05 Feb, 2021 | 00:00
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A divide-by-zero flaw was found in ImageMagick 6.9.11-57 and 7.0.10-57 in gem.c. This flaw allows an attacker who submits a crafted file that is processed by ImageMagick to trigger undefined behavior through a division by zero. The highest threat from this vulnerability is to system availability.

Action-Not Available
Vendor-n/aDebian GNU/LinuxImageMagick Studio LLC
Product-debian_linuximagemagickImageMagick
CWE ID-CWE-369
Divide By Zero
CVE-2009-2416
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.30% / 52.50%
||
7 Day CHG~0.00%
Published-11 Aug, 2009 | 18:00
Updated-21 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.

Action-Not Available
Vendor-n/aGoogle LLCFedora ProjectCanonical Ltd.libxml2 (XMLSoft)Debian GNU/LinuxSUSEopenSUSERed Hat, Inc.Apple Inc.VMware (Broadcom Inc.)Sun Microsystems (Oracle Corporation)
Product-vcenter_serverdebian_linuxenterprise_linuxiphone_osfedorasafarivmaopenoffice.orglibxmllinux_enterpriseubuntu_linuxmac_os_xopensuselibxml2linux_enterprise_serveresxmac_os_x_serveresxichromen/a
CWE ID-CWE-416
Use After Free
CVE-2018-16645
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.41% / 60.33%
||
7 Day CHG~0.00%
Published-06 Sep, 2018 | 22:00
Updated-05 Aug, 2024 | 10:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an excessive memory allocation issue in the functions ReadBMPImage of coders/bmp.c and ReadDIBImage of coders/dib.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image file.

Action-Not Available
Vendor-n/aImageMagick Studio LLCDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuximagemagickn/a
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2019-1010301
Matching Score-8
Assigner-7556d962-6fb7-411e-85fa-6cd62f095ba8
ShareView Details
Matching Score-8
Assigner-7556d962-6fb7-411e-85fa-6cd62f095ba8
CVSS Score-5.5||MEDIUM
EPSS-0.13% / 33.53%
||
7 Day CHG~0.00%
Published-15 Jul, 2019 | 17:10
Updated-05 Aug, 2024 | 03:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.

Action-Not Available
Vendor-jhead_projectjheadDebian GNU/LinuxFedora Project
Product-jheaddebian_linuxfedorajhead
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-16062
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 26.55%
||
7 Day CHG~0.00%
Published-29 Aug, 2018 | 03:00
Updated-05 Aug, 2024 | 10:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.

Action-Not Available
Vendor-elfutils_projectn/aCanonical Ltd.Red Hat, Inc.openSUSEDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxelfutilsenterprise_linux_workstationenterprise_linux_desktopleapn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-16336
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-1.06% / 76.72%
||
7 Day CHG~0.00%
Published-02 Sep, 2018 | 03:00
Updated-05 Aug, 2024 | 10:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, a different vulnerability than CVE-2018-10999.

Action-Not Available
Vendor-n/aCanonical Ltd.Exiv2Debian GNU/Linux
Product-ubuntu_linuxexiv2debian_linuxn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-16642
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.42% / 60.92%
||
7 Day CHG~0.00%
Published-06 Sep, 2018 | 22:00
Updated-05 Aug, 2024 | 10:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The function InsertRow in coders/cut.c in ImageMagick 7.0.7-37 allows remote attackers to cause a denial of service via a crafted image file due to an out-of-bounds write.

Action-Not Available
Vendor-n/aImageMagick Studio LLCDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuximagemagickn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-16643
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.46% / 63.11%
||
7 Day CHG~0.00%
Published-06 Sep, 2018 | 22:00
Updated-05 Aug, 2024 | 10:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.

Action-Not Available
Vendor-n/aImageMagick Studio LLCDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuximagemagickn/a
CWE ID-CWE-252
Unchecked Return Value
CVE-2018-16750
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 33.52%
||
7 Day CHG~0.00%
Published-09 Sep, 2018 | 15:00
Updated-05 Aug, 2024 | 10:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ImageMagick 7.0.7-29 and earlier, a memory leak in the formatIPTCfromBuffer function in coders/meta.c was found.

Action-Not Available
Vendor-n/aImageMagick Studio LLCCanonical Ltd.
Product-ubuntu_linuximagemagickn/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2018-16542
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.43% / 61.41%
||
7 Day CHG~0.00%
Published-05 Sep, 2018 | 18:00
Updated-05 Aug, 2024 | 10:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.

Action-Not Available
Vendor-n/aCanonical Ltd.Red Hat, Inc.Debian GNU/LinuxArtifex Software Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_server_eusghostscriptenterprise_linux_workstationenterprise_linuxenterprise_linux_desktopn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2014-3510
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-17.09% / 94.73%
||
7 Day CHG~0.00%
Published-13 Aug, 2014 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CVE-2018-16435
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.43% / 61.72%
||
7 Day CHG~0.00%
Published-04 Sep, 2018 | 00:00
Updated-05 Aug, 2024 | 10:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.

Action-Not Available
Vendor-littlecmsn/aCanonical Ltd.Red Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_workstationenterprise_linux_desktoplittle_cms_color_enginen/a
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2018-16640
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.19% / 40.82%
||
7 Day CHG~0.00%
Published-06 Sep, 2018 | 22:00
Updated-05 Aug, 2024 | 10:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c.

Action-Not Available
Vendor-n/aImageMagick Studio LLCCanonical Ltd.
Product-ubuntu_linuximagemagickn/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 36
  • 37
  • Next
Details not found