CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
77.9%
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | firewall_services_module | * | cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:* |
cisco | firewall_services_module | 1.1.2 | cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:* |
cisco | firewall_services_module | 1.1.3 | cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:* |
cisco | firewall_services_module | 1.1_(3.005) | cpe:2.3:h:cisco:firewall_services_module:1.1_\(3.005\):*:*:*:*:*:*:* |
cisco | firewall_services_module | 2.1_(0.208) | cpe:2.3:h:cisco:firewall_services_module:2.1_\(0.208\):*:*:*:*:*:*:* |
hp | aaa_server | * | cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:* |
hp | apache-based_web_server | 2.0.43.00 | cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:* |
hp | apache-based_web_server | 2.0.43.04 | cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:* |
symantec | clientless_vpn_gateway_4400 | 5.0 | cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:* |
cisco | ciscoworks_common_management_foundation | 2.1 | cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:* |
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834
docs.info.apple.com/article.html?artnum=61798
fedoranews.org/updates/FEDORA-2004-095.shtml
lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
lists.apple.com/mhonarc/security-announce/msg00045.html
marc.info/?l=bugtraq&m=107953412903636&w=2
marc.info/?l=bugtraq&m=108403806509920&w=2
secunia.com/advisories/11139
secunia.com/advisories/17381
secunia.com/advisories/17398
secunia.com/advisories/17401
secunia.com/advisories/18247
security.gentoo.org/glsa/glsa-200403-03.xml
sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524
support.avaya.com/elmodocs2/security/ASA-2005-239.htm
support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US
www.ciac.org/ciac/bulletins/o-101.shtml
www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml
www.debian.org/security/2004/dsa-465
www.kb.cert.org/vuls/id/288574
www.linuxsecurity.com/advisories/engarde_advisory-4135.html
www.mandriva.com/security/advisories?name=MDKSA-2004:023
www.novell.com/linux/security/advisories/2004_07_openssl.html
www.openssl.org/news/secadv_20040317.txt
www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html
www.redhat.com/support/errata/RHSA-2004-120.html
www.redhat.com/support/errata/RHSA-2004-121.html
www.redhat.com/support/errata/RHSA-2004-139.html
www.redhat.com/support/errata/RHSA-2005-829.html
www.redhat.com/support/errata/RHSA-2005-830.html
www.securityfocus.com/bid/9899
www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961
www.trustix.org/errata/2004/0012
www.uniras.gov.uk/vuls/2004/224012/index.htm
www.us-cert.gov/cas/techalerts/TA04-078A.html
exchange.xforce.ibmcloud.com/vulnerabilities/15505
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
77.9%