Lucene search

K
ubuntuUbuntuUSN-534-1
HistoryOct 22, 2007 - 12:00 a.m.

OpenSSL vulnerability

2007-10-2200:00:00
ubuntu.com
32

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.9 High

AI Score

Confidence

High

0.177 Low

EPSS

Percentile

96.2%

Releases

  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06

Packages

  • openssl -

Details

Andy Polyakov discovered that the DTLS implementation in OpenSSL
was vulnerable. A remote attacker could send a specially crafted
connection request to services using DTLS and execute arbitrary code
with the serviceโ€™s privileges. There are no known Ubuntu applications
that are currently using DTLS.

OSVersionArchitecturePackageVersionFilename
Ubuntu7.10noarchlibssl0.9.8<ย 0.9.8e-5ubuntu3.1UNKNOWN
Ubuntu7.10noarchlibcrypto0.9.8-udeb<ย 0.9.8e-5ubuntu3.1UNKNOWN
Ubuntu7.10noarchlibssl-dev<ย 0.9.8e-5ubuntu3.1UNKNOWN
Ubuntu7.10noarchlibssl0.9.8-dbg<ย 0.9.8e-5ubuntu3.1UNKNOWN
Ubuntu7.10noarchopenssl<ย 0.9.8e-5ubuntu3.1UNKNOWN
Ubuntu7.04noarchlibssl0.9.8<ย 0.9.8c-4ubuntu0.2UNKNOWN
Ubuntu7.04noarchlibcrypto0.9.8-udeb<ย 0.9.8c-4ubuntu0.2UNKNOWN
Ubuntu7.04noarchlibssl-dev<ย 0.9.8c-4ubuntu0.2UNKNOWN
Ubuntu7.04noarchlibssl0.9.8-dbg<ย 0.9.8c-4ubuntu0.2UNKNOWN
Ubuntu7.04noarchopenssl<ย 0.9.8c-4ubuntu0.2UNKNOWN
Rows per page:
1-10 of 201

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.9 High

AI Score

Confidence

High

0.177 Low

EPSS

Percentile

96.2%