CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
66.0%
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | firewall_services_module | * | cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:* |
cisco | firewall_services_module | 1.1.2 | cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:* |
cisco | firewall_services_module | 1.1.3 | cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:* |
cisco | firewall_services_module | 1.1_(3.005) | cpe:2.3:h:cisco:firewall_services_module:1.1_\(3.005\):*:*:*:*:*:*:* |
cisco | firewall_services_module | 2.1_(0.208) | cpe:2.3:h:cisco:firewall_services_module:2.1_\(0.208\):*:*:*:*:*:*:* |
hp | aaa_server | * | cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:* |
hp | apache-based_web_server | 2.0.43.00 | cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:* |
hp | apache-based_web_server | 2.0.43.04 | cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:* |
symantec | clientless_vpn_gateway_4400 | 5.0 | cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:* |
cisco | ciscoworks_common_management_foundation | 2.1 | cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:* |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt
ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834
fedoranews.org/updates/FEDORA-2004-095.shtml
marc.info/?l=bugtraq&m=107955049331965&w=2
marc.info/?l=bugtraq&m=108403850228012&w=2
rhn.redhat.com/errata/RHSA-2004-119.html
secunia.com/advisories/11139
security.gentoo.org/glsa/glsa-200403-03.xml
sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524
www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml
www.debian.org/security/2004/dsa-465
www.kb.cert.org/vuls/id/465542
www.linuxsecurity.com/advisories/engarde_advisory-4135.html
www.redhat.com/support/errata/RHSA-2004-120.html
www.redhat.com/support/errata/RHSA-2004-121.html
www.redhat.com/support/errata/RHSA-2004-139.html
www.securityfocus.com/bid/9899
www.trustix.org/errata/2004/0012
www.uniras.gov.uk/vuls/2004/224012/index.htm
www.us-cert.gov/cas/techalerts/TA04-078A.html
exchange.xforce.ibmcloud.com/vulnerabilities/15509
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902