ID OPENVAS:136141256231063266 Type openvas Reporter Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com Modified 2018-04-06T00:00:00
Description
The remote host is missing an update to ntp
announced via advisory FEDORA-2009-0547.
# OpenVAS Vulnerability Test
# $Id: fcore_2009_0547.nasl 9350 2018-04-06 07:03:33Z cfischer $
# Description: Auto-generated from advisory FEDORA-2009-0547 (ntp)
#
# Authors:
# Thomas Reinke <reinke@securityspace.com>
#
# Copyright:
# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# or at your option, GNU General Public License version 3,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
include("revisions-lib.inc");
tag_insight = "Update Information:
This update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5 before
4.2.5p150 does not properly check the return value from the OpenSSL
EVP_VerifyFinal function, which allows remote attackers to bypass validation of
the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys,
a similar vulnerability to CVE-2008-5077.
ChangeLog:
* Mon Jan 12 2009 Miroslav Lichvar 4.2.4p6-1.fc9
- update to 4.2.4p6 (CVE-2009-0021)";
tag_solution = "Apply the appropriate updates.
This update can be installed with the yum update program. Use
su -c 'yum update ntp' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.
https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0547";
tag_summary = "The remote host is missing an update to ntp
announced via advisory FEDORA-2009-0547.";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.63266");
script_version("$Revision: 9350 $");
script_tag(name:"last_modification", value:"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $");
script_tag(name:"creation_date", value:"2009-01-26 18:18:20 +0100 (Mon, 26 Jan 2009)");
script_cve_id("CVE-2009-0021", "CVE-2008-5077");
script_tag(name:"cvss_base", value:"5.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:P");
script_name("Fedora Core 9 FEDORA-2009-0547 (ntp)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms");
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name : "URL" , value : "https://bugzilla.redhat.com/show_bug.cgi?id=476807");
exit(0);
}
#
# The script code starts here
#
include("pkg-lib-rpm.inc");
res = "";
report = "";
if ((res = isrpmvuln(pkg:"ntp", rpm:"ntp~4.2.4p6~1.fc9", rls:"FC9")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"ntp-perl", rpm:"ntp-perl~4.2.4p6~1.fc9", rls:"FC9")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"ntpdate", rpm:"ntpdate~4.2.4p6~1.fc9", rls:"FC9")) != NULL) {
report += res;
}
if ((res = isrpmvuln(pkg:"ntp-debuginfo", rpm:"ntp-debuginfo~4.2.4p6~1.fc9", rls:"FC9")) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
{"id": "OPENVAS:136141256231063266", "type": "openvas", "bulletinFamily": "scanner", "title": "Fedora Core 9 FEDORA-2009-0547 (ntp)", "description": "The remote host is missing an update to ntp\nannounced via advisory FEDORA-2009-0547.", "published": "2009-01-26T00:00:00", "modified": "2018-04-06T00:00:00", "cvss": {"vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/", "score": 5.8}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063266", "reporter": "Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com", "references": ["https://bugzilla.redhat.com/show_bug.cgi?id=476807"], "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "lastseen": "2018-04-06T11:37:38", "viewCount": 0, "enchantments": {"score": {"value": 6.4, "vector": "NONE", "modified": "2018-04-06T11:37:38", "rev": 2}, "dependencies": {"references": [{"type": "f5", "idList": ["SOL9762", "SOL9889"]}, {"type": "cve", "idList": ["CVE-2009-0021", "CVE-2008-5077"]}, {"type": "openssl", "idList": ["OPENSSL:CVE-2008-5077"]}, {"type": "openvas", "idList": ["OPENVAS:136141256231063743", "OPENVAS:63266", "OPENVAS:63230", "OPENVAS:136141256231063149", "OPENVAS:65238", "OPENVAS:63743", "OPENVAS:136141256231063281", "OPENVAS:136141256231063230", "OPENVAS:136141256231063267", "OPENVAS:63267"]}, {"type": "slackware", "idList": ["SSA-2009-014-03", "SSA-2009-014-01"]}, {"type": "nessus", "idList": ["ORACLEVM_OVMSA-2009-0011.NASL", "FEDORA_2009-0547.NASL", "MANDRIVA_MDVSA-2009-007.NASL", "SUSE_XNTP-6072.NASL", "SUSE_XNTP-5936.NASL", "SL_20090129_NTP_ON_SL4_X.NASL", "GENTOO_GLSA-200904-05.NASL", "FEDORA_2009-0544.NASL", "SUSE_11_1_NTP-090119.NASL", "SLACKWARE_SSA_2009-014-03.NASL"]}, {"type": "gentoo", "idList": ["GLSA-200902-02", "GLSA-200904-05"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:9564", "SECURITYVULNS:DOC:21113"]}, {"type": "redhat", "idList": ["RHSA-2009:0046"]}, {"type": "ubuntu", "idList": ["USN-705-1"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1702-1:D3B79", "DEBIAN:DSA-1701-1:B97E4"]}, {"type": "centos", "idList": ["CESA-2009:0046", "CESA-2009:0004"]}, {"type": "oraclelinux", "idList": ["ELSA-2009-0004", "ELSA-2009-0046"]}, {"type": "seebug", "idList": ["SSV:4636"]}], "modified": "2018-04-06T11:37:38", "rev": 2}, "vulnersScore": 6.4}, "pluginID": "136141256231063266", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_0547.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-0547 (ntp)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nThis update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5 before\n4.2.5p150 does not properly check the return value from the OpenSSL\nEVP_VerifyFinal function, which allows remote attackers to bypass validation of\nthe certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys,\na similar vulnerability to CVE-2008-5077.\n\nChangeLog:\n\n* Mon Jan 12 2009 Miroslav Lichvar 4.2.4p6-1.fc9\n- update to 4.2.4p6 (CVE-2009-0021)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update ntp' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0547\";\ntag_summary = \"The remote host is missing an update to ntp\nannounced via advisory FEDORA-2009-0547.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63266\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-26 18:18:20 +0100 (Mon, 26 Jan 2009)\");\n script_cve_id(\"CVE-2009-0021\", \"CVE-2008-5077\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_name(\"Fedora Core 9 FEDORA-2009-0547 (ntp)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=476807\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.4p6~1.fc9\", rls:\"FC9\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-perl\", rpm:\"ntp-perl~4.2.4p6~1.fc9\", rls:\"FC9\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntpdate\", rpm:\"ntpdate~4.2.4p6~1.fc9\", rls:\"FC9\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-debuginfo\", rpm:\"ntp-debuginfo~4.2.4p6~1.fc9\", rls:\"FC9\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "naslFamily": "Fedora Local Security Checks"}
{"f5": [{"lastseen": "2016-09-26T17:23:26", "bulletinFamily": "software", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "edition": 1, "description": "**Description**\n\nNTP may not properly check the return value from the OpenSSL EVP_VerifyFinal function, which may allow a remote attacker to bypass validation of the certificate chain by way of a malformed SSL/TLS signature for DSA and ECDSA keys.\n\n**Note**: This is a similar vulnerability to CVE-2008-5077. For information about CVE-2008-5077, refer to SOL9762: OpenSSL vulnerability - CVE-2008-5077.\n\nInformation about this advisory is available at the following location:\n\n**Note**: This link takes you to a resource outside of AskF5, and it is possible that the information may be removed without our knowledge.\n\n<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021>\n\nThe FirePass, BIG-IP, and WebAccelerator products listed use a vulnerable version of NTP; however, these products are not subject to this vulnerability because, by default, these products do not use DSA and ECDSA certificates and keys for NTP. \n\nF5 Product Development is tracking a change request to upgrade the NTP version used as CR115608 for FirePass and BIG-IP products.\n", "modified": "2013-03-25T00:00:00", "published": "2009-04-05T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/9000/800/sol9889.html", "id": "SOL9889", "title": "SOL9889 - NTP vulnerability CVE-2009-0021", "type": "f5", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-26T17:23:21", "bulletinFamily": "software", "cvelist": ["CVE-2008-5077", "CVE-2009-0265", "CVE-2009-0025"], "edition": 1, "description": "OpenSSL 0.9.8i and earlier versions do not properly check the return value from the **EVP_VerifyFinal **function.\n\nInformation about this advisory is available at the following locations:\n\n<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077> \n \n<http://openssl.org/news/secadv_20090107.txt>\n\n**Note**: These links take you to a resource outside of AskF5, and it is possible that the information may be removed without our knowledge.\n\nF5 Product Development is tracking this issue as ID 294064 (formerly CR114792) to upgrade the version of OpenSSL used for the FirePass controller.\n\nThis is a similar vulnerability to CVE-2009-0025 and CVE-2009-0265. For information about CVE-2009-0025, refer to SOL9754: BIND 9 vulnerability CVE-2009-0025. For information about CVE-2009-0265, refer to SOL11503: BIND 9 vulnerability CVE-2009-0265.\n", "modified": "2014-05-29T00:00:00", "published": "2009-03-03T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/9000/700/sol9762.html", "id": "SOL9762", "title": "SOL9762 - OpenSSL vulnerability - CVE-2008-5077", "type": "f5", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "cve": [{"lastseen": "2020-12-09T19:28:26", "description": "OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.", "edition": 5, "cvss3": {}, "published": "2009-01-07T17:30:00", "title": "CVE-2008-5077", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-5077"], "modified": "2018-10-11T20:53:00", "cpe": ["cpe:/a:openssl:openssl:0.9.6e", "cpe:/a:openssl:openssl:0.9.8b", "cpe:/a:openssl:openssl:0.9.8h", "cpe:/a:openssl:openssl:0.9.3a", "cpe:/a:openssl:openssl:0.9.8a", "cpe:/a:openssl:openssl:0.9.7c", "cpe:/a:openssl:openssl:0.9.7j", "cpe:/a:openssl:openssl:0.9.6", "cpe:/a:openssl:openssl:0.9.7g", "cpe:/a:openssl:openssl:0.9.6j", "cpe:/a:openssl:openssl:0.9.7a", "cpe:/a:openssl:openssl:0.9.3", "cpe:/a:openssl:openssl:0.9.1c", "cpe:/a:openssl:openssl:0.9.7h", "cpe:/a:openssl:openssl:0.9.7", "cpe:/a:openssl:openssl:0.9.6k", "cpe:/a:openssl:openssl:0.9.5a", "cpe:/a:openssl:openssl:0.9.6a", "cpe:/a:openssl:openssl:0.9.7d", "cpe:/a:openssl:openssl:0.9.6h", "cpe:/a:openssl:openssl:0.9.8f", "cpe:/a:openssl:openssl:0.9.8", "cpe:/a:openssl:openssl:0.9.5", "cpe:/a:openssl:openssl:0.9.4", "cpe:/a:openssl:openssl:0.9.7f", "cpe:/a:openssl:openssl:0.9.8c", "cpe:/a:openssl:openssl:0.9.7b", "cpe:/a:openssl:openssl:0.9.6c", "cpe:/a:openssl:openssl:0.9.7l", "cpe:/a:openssl:openssl:0.9.6i", "cpe:/a:openssl:openssl:0.9.6d", "cpe:/a:openssl:openssl:0.9.7i", "cpe:/a:openssl:openssl:0.9.8d", "cpe:/a:openssl:openssl:0.9.7k", "cpe:/a:openssl:openssl:0.9.6g", "cpe:/a:openssl:openssl:0.9.6m", "cpe:/a:openssl:openssl:0.9.7e", "cpe:/a:openssl:openssl:0.9.6f", "cpe:/a:openssl:openssl:0.9.8e", "cpe:/a:openssl:openssl:0.9.8g", "cpe:/a:openssl:openssl:0.9.6b", "cpe:/a:openssl:openssl:0.9.2b", "cpe:/a:openssl:openssl:0.9.6l"], "id": "CVE-2008-5077", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5077", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}, "cpe23": ["cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:31:15", "description": "NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.\nNote that versions 4.2.5 before 4.2.5p150 are development versions and not production versions. Development versions are not included in the CPE configuration for CVEs.", "edition": 5, "cvss3": {}, "published": "2009-01-07T17:30:00", "title": "CVE-2009-0021", "type": "cve", "cwe": ["CWE-287"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-0021"], "modified": "2018-10-11T20:58:00", "cpe": ["cpe:/a:ntp:ntp:4.2.4p1", "cpe:/a:ntp:ntp:4.2.0", "cpe:/a:ntp:ntp:4.2.4p2", "cpe:/a:ntp:ntp:4.2.4p4", "cpe:/a:ntp:ntp:4.2.4p3", "cpe:/a:ntp:ntp:4.2.2"], "id": "CVE-2009-0021", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0021", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:ntp:ntp:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.4p1:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.4p3:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.4p2:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.4p4:*:*:*:*:*:*:*"]}], "openssl": [{"lastseen": "2020-09-14T11:36:50", "bulletinFamily": "software", "cvelist": ["CVE-2008-5077"], "description": " The Google Security Team discovered several functions inside OpenSSL incorrectly checked the result after calling the EVP_VerifyFinal function, allowing a malformed signature to be treated as a good signature rather than as an error. This issue affected the signature checks on DSA and ECDSA keys used with SSL/TLS. One way to exploit this flaw would be for a remote attacker who is in control of a malicious server or who can use a 'man in the middle' attack to present a malformed SSL/TLS signature from a certificate chain to a vulnerable client, bypassing validation. Reported by google. \n\n * Fixed in OpenSSL 0.9.8j (Affected 0.9.8-0.9.8i)\n", "edition": 1, "modified": "2009-01-07T00:00:00", "published": "2009-01-07T00:00:00", "id": "OPENSSL:CVE-2008-5077", "href": "https://www.openssl.org/news/secadv/20090107.txt", "title": "Vulnerability in OpenSSL CVE-2008-5077", "type": "openssl", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}], "openvas": [{"lastseen": "2017-07-25T10:56:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "description": "The remote host is missing an update to ntp\nannounced via advisory FEDORA-2009-0544.", "modified": "2017-07-10T00:00:00", "published": "2009-01-26T00:00:00", "id": "OPENVAS:63267", "href": "http://plugins.openvas.org/nasl.php?oid=63267", "type": "openvas", "title": "Fedora Core 10 FEDORA-2009-0544 (ntp)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_0544.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-0544 (ntp)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nThis update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5 before\n4.2.5p150 does not properly check the return value from the OpenSSL\nEVP_VerifyFinal function, which allows remote attackers to bypass validation of\nthe certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys,\na similar vulnerability to CVE-2008-5077.\n\nChangeLog:\n\n* Mon Jan 12 2009 Miroslav Lichvar 4.2.4p6-1\n- update to 4.2.4p6 (CVE-2009-0021)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update ntp' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0544\";\ntag_summary = \"The remote host is missing an update to ntp\nannounced via advisory FEDORA-2009-0544.\";\n\n\n\nif(description)\n{\n script_id(63267);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-26 18:18:20 +0100 (Mon, 26 Jan 2009)\");\n script_cve_id(\"CVE-2009-0021\", \"CVE-2008-5077\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_name(\"Fedora Core 10 FEDORA-2009-0544 (ntp)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=476807\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.4p6~1.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-perl\", rpm:\"ntp-perl~4.2.4p6~1.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntpdate\", rpm:\"ntpdate~4.2.4p6~1.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-debuginfo\", rpm:\"ntp-debuginfo~4.2.4p6~1.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:56:43", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200904-05.", "modified": "2017-07-07T00:00:00", "published": "2009-04-06T00:00:00", "id": "OPENVAS:63743", "href": "http://plugins.openvas.org/nasl.php?oid=63743", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200904-05 (ntp)", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"An error in the OpenSSL certificate chain validation in ntp might allow for\nspoofing attacks.\";\ntag_solution = \"All ntp users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-misc/ntp-4.2.4_p6'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200904-05\nhttp://bugs.gentoo.org/show_bug.cgi?id=254098\nhttp://www.gentoo.org/security/en/glsa/glsa-200902-02.xml\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200904-05.\";\n\n \n \n\nif(description)\n{\n script_id(63743);\n script_version(\"$Revision: 6595 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:19:55 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-06 20:58:11 +0200 (Mon, 06 Apr 2009)\");\n script_cve_id(\"CVE-2008-5077\", \"CVE-2009-0021\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200904-05 (ntp)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"net-misc/ntp\", unaffected: make_list(\"ge 4.2.4_p6\"), vulnerable: make_list(\"lt 4.2.4_p6\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:50:42", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "description": "The remote host is missing an update as announced\nvia advisory SSA:2009-014-03.", "modified": "2017-07-07T00:00:00", "published": "2012-09-11T00:00:00", "id": "OPENVAS:63230", "href": "http://plugins.openvas.org/nasl.php?oid=63230", "type": "openvas", "title": "Slackware Advisory SSA:2009-014-03 ntp", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: esoft_slk_ssa_2009_014_03.nasl 6598 2017-07-07 09:36:44Z cfischer $\n# Description: Auto-generated from the corresponding slackware advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,\n11.0, 12.0, 12.1, 12.2, and -current to a fix security issue.\n\nMore details about this issue may be found here:\nhttps://lists.ntp.org/pipermail/announce/2009-January/000055.html\nhttp://www.ocert.org/advisories/ocert-2008-016.html\";\ntag_summary = \"The remote host is missing an update as announced\nvia advisory SSA:2009-014-03.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=SSA:2009-014-03\";\n \nif(description)\n{\n script_id(63230);\n script_tag(name:\"creation_date\", value:\"2012-09-11 01:34:21 +0200 (Tue, 11 Sep 2012)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:36:44 +0200 (Fri, 07 Jul 2017) $\");\n script_cve_id(\"CVE-2009-0021\", \"CVE-2008-5077\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_version(\"$Revision: 6598 $\");\n name = \"Slackware Advisory SSA:2009-014-03 ntp \";\n script_name(name);\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Slackware Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/slackware_linux\", \"ssh/login/slackpack\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-slack.inc\");\nvuln = 0;\nif(isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i386-1_slack8.1\", rls:\"SLK8.1\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i386-1_slack9.0\", rls:\"SLK9.0\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack9.1\", rls:\"SLK9.1\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack10.0\", rls:\"SLK10.0\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack10.1\", rls:\"SLK10.1\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack10.2\", rls:\"SLK10.2\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack11.0\", rls:\"SLK11.0\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack12.0\", rls:\"SLK12.0\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack12.1\", rls:\"SLK12.1\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack12.2\", rls:\"SLK12.2\")) {\n vuln = 1;\n}\n\nif(vuln) {\n security_message(0);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:56:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "description": "The remote host is missing an update to ntp\nannounced via advisory FEDORA-2009-0547.", "modified": "2017-07-10T00:00:00", "published": "2009-01-26T00:00:00", "id": "OPENVAS:63266", "href": "http://plugins.openvas.org/nasl.php?oid=63266", "type": "openvas", "title": "Fedora Core 9 FEDORA-2009-0547 (ntp)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_0547.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-0547 (ntp)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nThis update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5 before\n4.2.5p150 does not properly check the return value from the OpenSSL\nEVP_VerifyFinal function, which allows remote attackers to bypass validation of\nthe certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys,\na similar vulnerability to CVE-2008-5077.\n\nChangeLog:\n\n* Mon Jan 12 2009 Miroslav Lichvar 4.2.4p6-1.fc9\n- update to 4.2.4p6 (CVE-2009-0021)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update ntp' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0547\";\ntag_summary = \"The remote host is missing an update to ntp\nannounced via advisory FEDORA-2009-0547.\";\n\n\n\nif(description)\n{\n script_id(63266);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-26 18:18:20 +0100 (Mon, 26 Jan 2009)\");\n script_cve_id(\"CVE-2009-0021\", \"CVE-2008-5077\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_name(\"Fedora Core 9 FEDORA-2009-0547 (ntp)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=476807\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.4p6~1.fc9\", rls:\"FC9\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-perl\", rpm:\"ntp-perl~4.2.4p6~1.fc9\", rls:\"FC9\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntpdate\", rpm:\"ntpdate~4.2.4p6~1.fc9\", rls:\"FC9\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-debuginfo\", rpm:\"ntp-debuginfo~4.2.4p6~1.fc9\", rls:\"FC9\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:57", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "description": "The remote host is missing an update as announced\nvia advisory SSA:2009-014-03.", "modified": "2019-03-15T00:00:00", "published": "2012-09-11T00:00:00", "id": "OPENVAS:136141256231063230", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063230", "type": "openvas", "title": "Slackware Advisory SSA:2009-014-03 ntp", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: esoft_slk_ssa_2009_014_03.nasl 14202 2019-03-15 09:16:15Z cfischer $\n# Description: Auto-generated from the corresponding slackware advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63230\");\n script_tag(name:\"creation_date\", value:\"2012-09-11 01:34:21 +0200 (Tue, 11 Sep 2012)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 10:16:15 +0100 (Fri, 15 Mar 2019) $\");\n script_cve_id(\"CVE-2009-0021\", \"CVE-2008-5077\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_version(\"$Revision: 14202 $\");\n script_name(\"Slackware Advisory SSA:2009-014-03 ntp\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Slackware Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/slackware_linux\", \"ssh/login/slackpack\", re:\"ssh/login/release=SLK(8\\.1|9\\.0|9\\.1|10\\.0|10\\.1|10\\.2|11\\.0|12\\.0|12\\.1|12\\.2)\");\n\n script_xref(name:\"URL\", value:\"https://secure1.securityspace.com/smysecure/catid.html?in=SSA:2009-014-03\");\n\n script_tag(name:\"insight\", value:\"New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,\n11.0, 12.0, 12.1, 12.2, and -current to a fix security issue.\n\nMore details about this issue is linked in the references.\");\n\n script_xref(name:\"URL\", value:\"https://lists.ntp.org/pipermail/announce/2009-January/000055.html\");\n script_xref(name:\"URL\", value:\"http://www.ocert.org/advisories/ocert-2008-016.html\");\n\n script_tag(name:\"solution\", value:\"Upgrade to the new package(s).\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update as announced\nvia advisory SSA:2009-014-03.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-slack.inc\");\n\nreport = \"\";\nres = \"\";\n\nif((res = isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i386-1_slack8.1\", rls:\"SLK8.1\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i386-1_slack9.0\", rls:\"SLK9.0\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack9.1\", rls:\"SLK9.1\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack10.0\", rls:\"SLK10.0\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack10.1\", rls:\"SLK10.1\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack10.2\", rls:\"SLK10.2\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack11.0\", rls:\"SLK11.0\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack12.0\", rls:\"SLK12.0\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack12.1\", rls:\"SLK12.1\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"ntp\", ver:\"4.2.4p6-i486-1_slack12.2\", rls:\"SLK12.2\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2018-04-06T11:39:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200904-05.", "modified": "2018-04-06T00:00:00", "published": "2009-04-06T00:00:00", "id": "OPENVAS:136141256231063743", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063743", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200904-05 (ntp)", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"An error in the OpenSSL certificate chain validation in ntp might allow for\nspoofing attacks.\";\ntag_solution = \"All ntp users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-misc/ntp-4.2.4_p6'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200904-05\nhttp://bugs.gentoo.org/show_bug.cgi?id=254098\nhttp://www.gentoo.org/security/en/glsa/glsa-200902-02.xml\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200904-05.\";\n\n \n \n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63743\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-06 20:58:11 +0200 (Mon, 06 Apr 2009)\");\n script_cve_id(\"CVE-2008-5077\", \"CVE-2009-0021\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200904-05 (ntp)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"net-misc/ntp\", unaffected: make_list(\"ge 4.2.4_p6\"), vulnerable: make_list(\"lt 4.2.4_p6\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:39:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "description": "The remote host is missing an update to ntp\nannounced via advisory FEDORA-2009-0544.", "modified": "2018-04-06T00:00:00", "published": "2009-01-26T00:00:00", "id": "OPENVAS:136141256231063267", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063267", "type": "openvas", "title": "Fedora Core 10 FEDORA-2009-0544 (ntp)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_0544.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-0544 (ntp)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nThis update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5 before\n4.2.5p150 does not properly check the return value from the OpenSSL\nEVP_VerifyFinal function, which allows remote attackers to bypass validation of\nthe certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys,\na similar vulnerability to CVE-2008-5077.\n\nChangeLog:\n\n* Mon Jan 12 2009 Miroslav Lichvar 4.2.4p6-1\n- update to 4.2.4p6 (CVE-2009-0021)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update ntp' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-0544\";\ntag_summary = \"The remote host is missing an update to ntp\nannounced via advisory FEDORA-2009-0544.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63267\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-26 18:18:20 +0100 (Mon, 26 Jan 2009)\");\n script_cve_id(\"CVE-2009-0021\", \"CVE-2008-5077\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_name(\"Fedora Core 10 FEDORA-2009-0544 (ntp)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=476807\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.4p6~1.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-perl\", rpm:\"ntp-perl~4.2.4p6~1.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntpdate\", rpm:\"ntpdate~4.2.4p6~1.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-debuginfo\", rpm:\"ntp-debuginfo~4.2.4p6~1.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:56:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021"], "description": "The remote host is missing an update to ntp\nannounced via advisory MDVSA-2009:007.", "modified": "2017-07-06T00:00:00", "published": "2009-01-20T00:00:00", "id": "OPENVAS:63194", "href": "http://plugins.openvas.org/nasl.php?oid=63194", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:007 (ntp)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_007.nasl 6573 2017-07-06 13:10:50Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:007 (ntp)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A flaw was found in how NTP checked the return value of signature\nverification. A remote attacker could use this to bypass certificate\nvalidation by using a malformed SSL/TLS signature (CVE-2009-0021).\n\nThe updated packages have been patched to prevent this issue.\n\nAffected: 2008.0, 2008.1, 2009.0, Corporate 3.0, Corporate 4.0,\n Multi Network Firewall 2.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:007\";\ntag_summary = \"The remote host is missing an update to ntp\nannounced via advisory MDVSA-2009:007.\";\n\n \n\nif(description)\n{\n script_id(63194);\n script_version(\"$Revision: 6573 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:10:50 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-20 22:42:09 +0100 (Tue, 20 Jan 2009)\");\n script_cve_id(\"CVE-2009-0021\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:007 (ntp)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.4~10.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-client\", rpm:\"ntp-client~4.2.4~10.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-doc\", rpm:\"ntp-doc~4.2.4~10.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.4~15.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-client\", rpm:\"ntp-client~4.2.4~15.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-doc\", rpm:\"ntp-doc~4.2.4~15.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.4~18.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-client\", rpm:\"ntp-client~4.2.4~18.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-doc\", rpm:\"ntp-doc~4.2.4~18.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.0~2.1.C30mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.0~21.3.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-client\", rpm:\"ntp-client~4.2.0~21.3.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.0~2.1.C30mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2018-04-06T11:38:16", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021"], "description": "The remote host is missing an update to ntp\nannounced via advisory MDVSA-2009:007.", "modified": "2018-04-06T00:00:00", "published": "2009-01-20T00:00:00", "id": "OPENVAS:136141256231063194", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063194", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:007 (ntp)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_007.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:007 (ntp)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A flaw was found in how NTP checked the return value of signature\nverification. A remote attacker could use this to bypass certificate\nvalidation by using a malformed SSL/TLS signature (CVE-2009-0021).\n\nThe updated packages have been patched to prevent this issue.\n\nAffected: 2008.0, 2008.1, 2009.0, Corporate 3.0, Corporate 4.0,\n Multi Network Firewall 2.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:007\";\ntag_summary = \"The remote host is missing an update to ntp\nannounced via advisory MDVSA-2009:007.\";\n\n \n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63194\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-20 22:42:09 +0100 (Tue, 20 Jan 2009)\");\n script_cve_id(\"CVE-2009-0021\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:007 (ntp)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.4~10.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-client\", rpm:\"ntp-client~4.2.4~10.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-doc\", rpm:\"ntp-doc~4.2.4~10.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.4~15.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-client\", rpm:\"ntp-client~4.2.4~15.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-doc\", rpm:\"ntp-doc~4.2.4~15.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.4~18.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-client\", rpm:\"ntp-client~4.2.4~18.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-doc\", rpm:\"ntp-doc~4.2.4~18.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.0~2.1.C30mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.0~21.3.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp-client\", rpm:\"ntp-client~4.2.0~21.3.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"ntp\", rpm:\"ntp~4.2.0~2.1.C30mdk\", rls:\"MNDK_2.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2018-04-06T11:39:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory FreeBSD-SA-09:03.ntpd.asc", "modified": "2018-04-06T00:00:00", "published": "2009-01-20T00:00:00", "id": "OPENVAS:136141256231063242", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063242", "type": "openvas", "title": "FreeBSD Security Advisory (FreeBSD-SA-09:03.ntpd.asc)", "sourceData": "#\n#ADV FreeBSD-SA-09:03.ntpd.asc\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from ADV FreeBSD-SA-09:03.ntpd.asc\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ntag_insight = \"The ntpd daemon is an implementation of the Network Time Protocol\n(NTP) used to synchronize the time of a computer system to a reference\ntime source.\n\nFreeBSD includes software from the OpenSSL Project. The OpenSSL\nProject is a collaborative effort to develop a robust,\ncommercial-grade, full-featured Open Source toolkit implementing the\nSecure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1)\nprotocols as well as a full-strength general purpose cryptography\nlibrary.\n\nThe EVP_VerifyFinal() function from OpenSSL is used to determine if a\ndigital signature is valid. When ntpd(8) is set to cryptographically\nauthenticate NTP data it incorrectly checks the return value from\nEVP_VerifyFinal().\";\ntag_solution = \"Upgrade your system to the appropriate stable release\nor security branch dated after the correction date\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-09:03.ntpd.asc\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory FreeBSD-SA-09:03.ntpd.asc\";\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63242\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-20 22:42:09 +0100 (Tue, 20 Jan 2009)\");\n script_cve_id(\"CVE-2009-0021\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n name = \"FreeBSD Security Advisory (FreeBSD-SA-09:03.ntpd.asc)\";\n script_name(name);\n\n\n\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n family = \"FreeBSD Local Security Checks\";\n script_family(family);\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdpatchlevel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\nvuln = 0;\nif(patchlevelcmp(rel:\"7.1\", patchlevel:\"2\")<0) {\n vuln = 1;\n}\nif(patchlevelcmp(rel:\"7.0\", patchlevel:\"9\")<0) {\n vuln = 1;\n}\nif(patchlevelcmp(rel:\"6.4\", patchlevel:\"3\")<0) {\n vuln = 1;\n}\nif(patchlevelcmp(rel:\"6.3\", patchlevel:\"9\")<0) {\n vuln = 1;\n}\n\nif(vuln) {\n security_message(0);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}], "nessus": [{"lastseen": "2021-01-12T10:06:50", "description": "This update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5\nbefore 4.2.5p150 does not properly check the return value from the\nOpenSSL EVP_VerifyFinal function, which allows remote attackers to\nbypass validation of the certificate chain via a malformed SSL/TLS\nsignature for DSA and ECDSA keys, a similar vulnerability to\nCVE-2008-5077.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "published": "2009-04-23T00:00:00", "title": "Fedora 10 : ntp-4.2.4p6-1.fc10 (2009-0544)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "modified": "2009-04-23T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:10", "p-cpe:/a:fedoraproject:fedora:ntp"], "id": "FEDORA_2009-0544.NASL", "href": "https://www.tenable.com/plugins/nessus/36222", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-0544.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(36222);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2009-0021\");\n script_xref(name:\"FEDORA\", value:\"2009-0544\");\n\n script_name(english:\"Fedora 10 : ntp-4.2.4p6-1.fc10 (2009-0544)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5\nbefore 4.2.5p150 does not properly check the return value from the\nOpenSSL EVP_VerifyFinal function, which allows remote attackers to\nbypass validation of the certificate chain via a malformed SSL/TLS\nsignature for DSA and ECDSA keys, a similar vulnerability to\nCVE-2008-5077.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=476807\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-January/019321.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0ab1787d\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ntp package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cwe_id(287);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/01/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^10([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 10.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC10\", reference:\"ntp-4.2.4p6-1.fc10\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-07T10:52:30", "description": "The remote host is affected by the vulnerability described in GLSA-200904-05\n(ntp: Certificate validation error)\n\n It has been reported that ntp incorrectly checks the return value of\n the EVP_VerifyFinal(), a vulnerability related to CVE-2008-5077 (GLSA\n 200902-02).\n \nImpact :\n\n A remote attacker could exploit this vulnerability to spoof arbitrary\n names to conduct Man-In-The-Middle attacks and intercept sensitive\n information.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 28, "published": "2009-04-07T00:00:00", "title": "GLSA-200904-05 : ntp: Certificate validation error", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "modified": "2009-04-07T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:ntp"], "id": "GENTOO_GLSA-200904-05.NASL", "href": "https://www.tenable.com/plugins/nessus/36093", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200904-05.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(36093);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2008-5077\", \"CVE-2009-0021\");\n script_bugtraq_id(33150);\n script_xref(name:\"GLSA\", value:\"200904-05\");\n\n script_name(english:\"GLSA-200904-05 : ntp: Certificate validation error\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200904-05\n(ntp: Certificate validation error)\n\n It has been reported that ntp incorrectly checks the return value of\n the EVP_VerifyFinal(), a vulnerability related to CVE-2008-5077 (GLSA\n 200902-02).\n \nImpact :\n\n A remote attacker could exploit this vulnerability to spoof arbitrary\n names to conduct Man-In-The-Middle attacks and intercept sensitive\n information.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200902-02\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200904-05\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All ntp users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-misc/ntp-4.2.4_p6'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 287);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/04/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-misc/ntp\", unaffected:make_list(\"ge 4.2.4_p6\"), vulnerable:make_list(\"lt 4.2.4_p6\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2021-01-12T10:06:50", "description": "This update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5\nbefore 4.2.5p150 does not properly check the return value from the\nOpenSSL EVP_VerifyFinal function, which allows remote attackers to\nbypass validation of the certificate chain via a malformed SSL/TLS\nsignature for DSA and ECDSA keys, a similar vulnerability to\nCVE-2008-5077.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2009-01-26T00:00:00", "title": "Fedora 9 : ntp-4.2.4p6-1.fc9 (2009-0547)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "modified": "2009-01-26T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:9", "p-cpe:/a:fedoraproject:fedora:ntp"], "id": "FEDORA_2009-0547.NASL", "href": "https://www.tenable.com/plugins/nessus/35455", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-0547.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(35455);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2009-0021\");\n script_bugtraq_id(33150);\n script_xref(name:\"FEDORA\", value:\"2009-0547\");\n\n script_name(english:\"Fedora 9 : ntp-4.2.4p6-1.fc9 (2009-0547)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes CVE-2009-0021: NTP 4.2.4 before 4.2.4p5 and 4.2.5\nbefore 4.2.5p150 does not properly check the return value from the\nOpenSSL EVP_VerifyFinal function, which allows remote attackers to\nbypass validation of the certificate chain via a malformed SSL/TLS\nsignature for DSA and ECDSA keys, a similar vulnerability to\nCVE-2008-5077.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=476807\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-January/019306.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?15a8ae0c\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ntp package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(287);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:9\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/01/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/01/26\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^9([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 9.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC9\", reference:\"ntp-4.2.4p6-1.fc9\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-17T09:10:25", "description": "New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0,\n10.1, 10.2, 11.0, 12.0, 12.1, 12.2, and -current to a fix security\nissue.", "edition": 26, "published": "2009-01-15T00:00:00", "title": "Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 8.1 / 9.0 / 9.1 / current : ntp (SSA:2009-014-03)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "modified": "2009-01-15T00:00:00", "cpe": ["cpe:/o:slackware:slackware_linux:12.0", "cpe:/o:slackware:slackware_linux:8.1", "cpe:/o:slackware:slackware_linux:9.0", "cpe:/o:slackware:slackware_linux:12.2", "cpe:/o:slackware:slackware_linux:9.1", "cpe:/o:slackware:slackware_linux:10.1", "p-cpe:/a:slackware:slackware_linux:ntp", "cpe:/o:slackware:slackware_linux:10.0", "cpe:/o:slackware:slackware_linux:11.0", "cpe:/o:slackware:slackware_linux", "cpe:/o:slackware:slackware_linux:10.2", "cpe:/o:slackware:slackware_linux:12.1"], "id": "SLACKWARE_SSA_2009-014-03.NASL", "href": "https://www.tenable.com/plugins/nessus/35377", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Slackware Security Advisory 2009-014-03. The text \n# itself is copyright (C) Slackware Linux, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(35377);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-5077\", \"CVE-2009-0021\");\n script_xref(name:\"SSA\", value:\"2009-014-03\");\n\n script_name(english:\"Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 8.1 / 9.0 / 9.1 / current : ntp (SSA:2009-014-03)\");\n script_summary(english:\"Checks for updated package in /var/log/packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Slackware host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0,\n10.1, 10.2, 11.0, 12.0, 12.1, 12.2, and -current to a fix security\nissue.\"\n );\n # http://www.ocert.org/advisories/ocert-2008-016.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://ocert.org/advisories/ocert-2008-016.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.ntp.org/pipermail/announce/2009-January/000055.html\"\n );\n # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.531177\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2a0a1047\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ntp package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_cwe_id(20, 287);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:10.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:10.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:11.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:12.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:12.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:12.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:9.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:9.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/01/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/01/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Slackware Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Slackware/release\", \"Host/Slackware/packages\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"slackware.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Slackware/release\")) audit(AUDIT_OS_NOT, \"Slackware\");\nif (!get_kb_item(\"Host/Slackware/packages\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Slackware\", cpu);\n\n\nflag = 0;\nif (slackware_check(osver:\"8.1\", pkgname:\"ntp\", pkgver:\"4.2.4p6\", pkgarch:\"i386\", pkgnum:\"1_slack8.1\")) flag++;\n\nif (slackware_check(osver:\"9.0\", pkgname:\"ntp\", pkgver:\"4.2.4p6\", pkgarch:\"i386\", pkgnum:\"1_slack9.0\")) flag++;\n\nif (slackware_check(osver:\"9.1\", pkgname:\"ntp\", pkgver:\"4.2.4p6\", pkgarch:\"i486\", pkgnum:\"1_slack9.1\")) flag++;\n\nif (slackware_check(osver:\"10.0\", pkgname:\"ntp\", pkgver:\"4.2.4p6\", pkgarch:\"i486\", pkgnum:\"1_slack10.0\")) flag++;\n\nif (slackware_check(osver:\"10.1\", pkgname:\"ntp\", pkgver:\"4.2.4p6\", pkgarch:\"i486\", pkgnum:\"1_slack10.1\")) flag++;\n\nif (slackware_check(osver:\"10.2\", pkgname:\"ntp\", pkgver:\"4.2.4p6\", pkgarch:\"i486\", pkgnum:\"1_slack10.2\")) flag++;\n\nif (slackware_check(osver:\"11.0\", pkgname:\"ntp\", pkgver:\"4.2.4p6\", pkgarch:\"i486\", pkgnum:\"1_slack11.0\")) flag++;\n\nif (slackware_check(osver:\"12.0\", pkgname:\"ntp\", pkgver:\"4.2.4p6\", pkgarch:\"i486\", pkgnum:\"1_slack12.0\")) flag++;\n\nif (slackware_check(osver:\"12.1\", pkgname:\"ntp\", pkgver:\"4.2.4p6\", pkgarch:\"i486\", pkgnum:\"1_slack12.1\")) flag++;\n\nif (slackware_check(osver:\"12.2\", pkgname:\"ntp\", pkgver:\"4.2.4p6\", pkgarch:\"i486\", pkgnum:\"1_slack12.2\")) flag++;\n\nif (slackware_check(osver:\"current\", pkgname:\"ntp\", pkgver:\"4.2.4p6\", pkgarch:\"i486\", pkgnum:\"1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:slackware_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2021-01-17T13:00:22", "description": "The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\nCVE-2009-0159 Stack-based buffer overflow in the cookedprint function\nin ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP\nservers to execute arbitrary code via a crafted response.\n\nCVE-2009-1252 Stack-based buffer overflow in the crypto_recv function\nin ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before\n4.2.5p74, when OpenSSL and autokey are enabled, allows remote\nattackers to execute arbitrary code via a crafted packet containing an\nextension field.\n\nCVE-2009-0021 NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does\nnot properly check the return value from the OpenSSL EVP_VerifyFinal\nfunction, which allows remote attackers to bypass validation of the\ncertificate chain via a malformed SSL/TLS signature for DSA and ECDSA\nkeys, a similar vulnerability to CVE-2008-5077.\n\n - fix buffer overflow when parsing Autokey association\n message (#500783, CVE-2009-1252)\n\n - fix buffer overflow in ntpq (#500783, CVE-2009-0159)\n\n - fix check for malformed signatures (#479698,\n CVE-2009-0021)\n\n - fix selecting multicast interface (#444106)\n\n - disable kernel discipline when -x option is used\n (#431729)\n\n - avoid use of uninitialized floating-point values in\n clock_select (#250838)\n\n - generate man pages from html source, include config man\n pages (#307271)\n\n - add note about paths and exit codes to ntpd man page\n (#242925, #246568)\n\n - add section about exit codes to ntpd man page (#319591)\n\n - always return 0 in scriptlets\n\n - pass additional options to ntpdate (#240141)\n\n - fix broadcast client to accept broadcasts on\n 255.255.255.255 (#226958)\n\n - compile with crypto support on 64bit architectures\n (#239580)\n\n - add ncurses-devel to buildrequires (#239580)\n\n - exit with nonzero code if ntpd -q did not set clock\n (#240134)\n\n - fix return codes in init script (#240118)", "edition": 27, "published": "2014-11-26T00:00:00", "title": "OracleVM 2.1 : ntp (OVMSA-2009-0011)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021", "CVE-2008-5077", "CVE-2009-0159", "CVE-2009-1252"], "modified": "2014-11-26T00:00:00", "cpe": ["cpe:/o:oracle:vm_server:2.1", "p-cpe:/a:oracle:vm:ntp"], "id": "ORACLEVM_OVMSA-2009-0011.NASL", "href": "https://www.tenable.com/plugins/nessus/79458", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from OracleVM\n# Security Advisory OVMSA-2009-0011.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79458);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-5077\", \"CVE-2009-0021\", \"CVE-2009-0159\", \"CVE-2009-1252\");\n script_bugtraq_id(33150, 34481, 35017);\n\n script_name(english:\"OracleVM 2.1 : ntp (OVMSA-2009-0011)\");\n script_summary(english:\"Checks the RPM output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote OracleVM host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\nCVE-2009-0159 Stack-based buffer overflow in the cookedprint function\nin ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP\nservers to execute arbitrary code via a crafted response.\n\nCVE-2009-1252 Stack-based buffer overflow in the crypto_recv function\nin ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before\n4.2.5p74, when OpenSSL and autokey are enabled, allows remote\nattackers to execute arbitrary code via a crafted packet containing an\nextension field.\n\nCVE-2009-0021 NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does\nnot properly check the return value from the OpenSSL EVP_VerifyFinal\nfunction, which allows remote attackers to bypass validation of the\ncertificate chain via a malformed SSL/TLS signature for DSA and ECDSA\nkeys, a similar vulnerability to CVE-2008-5077.\n\n - fix buffer overflow when parsing Autokey association\n message (#500783, CVE-2009-1252)\n\n - fix buffer overflow in ntpq (#500783, CVE-2009-0159)\n\n - fix check for malformed signatures (#479698,\n CVE-2009-0021)\n\n - fix selecting multicast interface (#444106)\n\n - disable kernel discipline when -x option is used\n (#431729)\n\n - avoid use of uninitialized floating-point values in\n clock_select (#250838)\n\n - generate man pages from html source, include config man\n pages (#307271)\n\n - add note about paths and exit codes to ntpd man page\n (#242925, #246568)\n\n - add section about exit codes to ntpd man page (#319591)\n\n - always return 0 in scriptlets\n\n - pass additional options to ntpdate (#240141)\n\n - fix broadcast client to accept broadcasts on\n 255.255.255.255 (#226958)\n\n - compile with crypto support on 64bit architectures\n (#239580)\n\n - add ncurses-devel to buildrequires (#239580)\n\n - exit with nonzero code if ntpd -q did not set clock\n (#240134)\n\n - fix return codes in init script (#240118)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/oraclevm-errata/2009-May/000024.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ntp package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 119, 287);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:2.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/01/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/05/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"OracleVM Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleVM/release\", \"Host/OracleVM/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/OracleVM/release\");\nif (isnull(release) || \"OVS\" >!< release) audit(AUDIT_OS_NOT, \"OracleVM\");\nif (! preg(pattern:\"^OVS\" + \"2\\.1\" + \"(\\.[0-9]|$)\", string:release)) audit(AUDIT_OS_NOT, \"OracleVM 2.1\", \"OracleVM \" + release);\nif (!get_kb_item(\"Host/OracleVM/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"OracleVM\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"OVS2.1\", reference:\"ntp-4.2.2p1-9.el5_3.2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:03:37", "description": "This update of ntp improves a check for the return value of openssl's\nfunction EVP_VerifyFinal(). (CVE-2009-0021)", "edition": 24, "published": "2009-07-21T00:00:00", "title": "openSUSE Security Update : ntp (ntp-439)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021"], "modified": "2009-07-21T00:00:00", "cpe": ["cpe:/o:novell:opensuse:11.0", "p-cpe:/a:novell:opensuse:ntp"], "id": "SUSE_11_0_NTP-090119.NASL", "href": "https://www.tenable.com/plugins/nessus/40082", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update ntp-439.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(40082);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0021\");\n\n script_name(english:\"openSUSE Security Update : ntp (ntp-439)\");\n script_summary(english:\"Check for the ntp-439 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update of ntp improves a check for the return value of openssl's\nfunction EVP_VerifyFinal(). (CVE-2009-0021)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=459662\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ntp package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cwe_id(287);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/07/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.0\", reference:\"ntp-4.2.4p4-44.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-17T14:02:18", "description": "This update of ntp improves a check for the return value of openssl's\nfunction EVP_VerifyFinal(). (CVE-2009-0021) Additionally a fix\n(non-security) for starting ntpd with the option -x was added.", "edition": 24, "published": "2009-09-24T00:00:00", "title": "SuSE9 Security Update : xntp, xntp-doc (YOU Patch Number 12338)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021"], "modified": "2009-09-24T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE9_12338.NASL", "href": "https://www.tenable.com/plugins/nessus/41269", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(41269);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0021\");\n\n script_name(english:\"SuSE9 Security Update : xntp, xntp-doc (YOU Patch Number 12338)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 9 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update of ntp improves a check for the return value of openssl's\nfunction EVP_VerifyFinal(). (CVE-2009-0021) Additionally a fix\n(non-security) for starting ntpd with the option -x was added.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-0021.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply YOU patch number 12338.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cwe_id(287);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 9 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SUSE9\", reference:\"xntp-4.2.0a-23.17\")) flag++;\nif (rpm_check(release:\"SUSE9\", reference:\"xntp-doc-4.2.0a-23.17\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-17T14:47:20", "description": "This update of ntp improves a check for the return value of openssl's\nfunction EVP_VerifyFinal(). (CVE-2009-0021)", "edition": 24, "published": "2009-02-20T00:00:00", "title": "openSUSE 10 Security Update : xntp (xntp-5936)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021"], "modified": "2009-02-20T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:xntp", "cpe:/o:novell:opensuse:10.3"], "id": "SUSE_XNTP-5936.NASL", "href": "https://www.tenable.com/plugins/nessus/35723", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update xntp-5936.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(35723);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0021\");\n\n script_name(english:\"openSUSE 10 Security Update : xntp (xntp-5936)\");\n script_summary(english:\"Check for the xntp-5936 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update of ntp improves a check for the return value of openssl's\nfunction EVP_VerifyFinal(). (CVE-2009-0021)\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected xntp package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cwe_id(287);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/02/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.3\", reference:\"xntp-4.2.4p3-25.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xntp\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-07T11:52:01", "description": "A flaw was found in how NTP checked the return value of signature\nverification. A remote attacker could use this to bypass certificate\nvalidation by using a malformed SSL/TLS signature (CVE-2009-0021).\n\nThe updated packages have been patched to prevent this issue.", "edition": 25, "published": "2009-04-23T00:00:00", "title": "Mandriva Linux Security Advisory : ntp (MDVSA-2009:007)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021"], "modified": "2009-04-23T00:00:00", "cpe": ["cpe:/o:mandriva:linux:2009.0", "p-cpe:/a:mandriva:linux:ntp-client", "cpe:/o:mandriva:linux:2008.1", "cpe:/o:mandriva:linux:2008.0", "p-cpe:/a:mandriva:linux:ntp", "p-cpe:/a:mandriva:linux:ntp-doc"], "id": "MANDRIVA_MDVSA-2009-007.NASL", "href": "https://www.tenable.com/plugins/nessus/36723", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2009:007. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(36723);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2009-0021\");\n script_bugtraq_id(33150);\n script_xref(name:\"MDVSA\", value:\"2009:007\");\n\n script_name(english:\"Mandriva Linux Security Advisory : ntp (MDVSA-2009:007)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was found in how NTP checked the return value of signature\nverification. A remote attacker could use this to bypass certificate\nvalidation by using a malformed SSL/TLS signature (CVE-2009-0021).\n\nThe updated packages have been patched to prevent this issue.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected ntp, ntp-client and / or ntp-doc packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(287);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:ntp-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:ntp-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/01/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2008.0\", reference:\"ntp-4.2.4-10.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"ntp-client-4.2.4-10.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"ntp-doc-4.2.4-10.1mdv2008.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2008.1\", reference:\"ntp-4.2.4-15.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"ntp-client-4.2.4-15.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"ntp-doc-4.2.4-15.1mdv2008.1\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2009.0\", reference:\"ntp-4.2.4-18.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"ntp-client-4.2.4-18.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"ntp-doc-4.2.4-18.1mdv2009.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-17T14:04:57", "description": "This update of ntp improves a check for the return value of openssl's\nfunction EVP_VerifyFinal(). (CVE-2009-0021)", "edition": 24, "published": "2009-07-21T00:00:00", "title": "openSUSE Security Update : ntp (ntp-439)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-0021"], "modified": "2009-07-21T00:00:00", "cpe": ["cpe:/o:novell:opensuse:11.1", "p-cpe:/a:novell:opensuse:ntp"], "id": "SUSE_11_1_NTP-090119.NASL", "href": "https://www.tenable.com/plugins/nessus/40284", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update ntp-439.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(40284);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0021\");\n\n script_name(english:\"openSUSE Security Update : ntp (ntp-439)\");\n script_summary(english:\"Check for the ntp-439 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update of ntp improves a check for the return value of openssl's\nfunction EVP_VerifyFinal(). (CVE-2009-0021)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=459662\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ntp package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cwe_id(287);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ntp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/07/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.1\", reference:\"ntp-4.2.4p5-15.11.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ntp\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:00", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "description": "### Background\n\nntp contains the client and daemon implementations for the Network Time Protocol. \n\n### Description\n\nIt has been reported that ntp incorrectly checks the return value of the EVP_VerifyFinal(), a vulnerability related to CVE-2008-5077 (GLSA 200902-02). \n\n### Impact\n\nA remote attacker could exploit this vulnerability to spoof arbitrary names to conduct Man-In-The-Middle attacks and intercept sensitive information. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll ntp users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-misc/ntp-4.2.4_p6\"", "edition": 1, "modified": "2009-04-05T00:00:00", "published": "2009-04-05T00:00:00", "id": "GLSA-200904-05", "href": "https://security.gentoo.org/glsa/200904-05", "type": "gentoo", "title": "ntp: Certificate validation error", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5077", "CVE-2009-0021"], "description": "The Network Time Protocol (NTP) is used to synchronize a computer's time with another reference time source. This package includes ntpd (a daemon which continuously adjusts system time) and utilities used to query and configure the ntpd daemon. Perl scripts ntp-wait and ntptrace are in the ntp-perl package and the ntpdate program is in the ntpdate package. ", "modified": "2009-01-24T02:32:42", "published": "2009-01-24T02:32:42", "id": "FEDORA:E3B09208486", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 9 Update: ntp-4.2.4p6-1.fc9", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5077", "CVE-2009-0021"], "description": "The Network Time Protocol (NTP) is used to synchronize a computer's time with another reference time source. This package includes ntpd (a daemon which continuously adjusts system time) and utilities used to query and configure the ntpd daemon. Perl scripts ntp-wait and ntptrace are in the ntp-perl package and the ntpdate program is in the ntpdate package. ", "modified": "2009-01-24T02:34:08", "published": "2009-01-24T02:34:08", "id": "FEDORA:AE84D208486", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 10 Update: ntp-4.2.4p6-1.fc10", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5077"], "description": "The TrustedQSL library is used for generating digitally signed QSO records (records of Amateur Radio contacts). This package contains the library and configuration files needed to run TrustedQSL applications. ", "modified": "2009-01-15T03:07:29", "published": "2009-01-15T03:07:29", "id": "FEDORA:387A188046", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 9 Update: tqsllib-2.0-5.fc9", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5077"], "description": "The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols. ", "modified": "2009-01-08T04:19:50", "published": "2009-01-08T04:19:50", "id": "FEDORA:DF3FD208477", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 10 Update: openssl-0.9.8g-12.fc10", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}], "slackware": [{"lastseen": "2019-05-30T07:37:14", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0021", "CVE-2008-5077"], "description": "New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,\n11.0, 12.0, 12.1, 12.2, and -current to a fix security issue.\n\nMore details about this issue may be found here:\n https://lists.ntp.org/pipermail/announce/2009-January/000055.html\n http://www.ocert.org/advisories/ocert-2008-016.html\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077\n\n\nHere are the details from the Slackware 12.2 ChangeLog:\n\npatches/packages/ntp-4.2.4p6-i486-1_slack12.2.tgz:\n [Sec 1111] Fix incorrect check of EVP_VerifyFinal()'s return value.\n For more information, see:\n https://lists.ntp.org/pipermail/announce/2009-January/000055.html\n http://www.ocert.org/advisories/ocert-2008-016.html\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077\n (* Security fix *)\n\nWhere to find the new packages:\n\nHINT: Getting slow download speeds from ftp.slackware.com?\nGive slackware.osuosl.org a try. This is another primary FTP site\nfor Slackware that can be considerably faster than downloading\ndirectly from ftp.slackware.com.\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating additional FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the "Get Slack" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 8.1:\nftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/ntp-4.2.4p6-i386-1_slack8.1.tgz\n\nUpdated package for Slackware 9.0:\nftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/ntp-4.2.4p6-i386-1_slack9.0.tgz\n\nUpdated package for Slackware 9.1:\nftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/ntp-4.2.4p6-i486-1_slack9.1.tgz\n\nUpdated package for Slackware 10.0:\nftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/ntp-4.2.4p6-i486-1_slack10.0.tgz\n\nUpdated package for Slackware 10.1:\nftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/ntp-4.2.4p6-i486-1_slack10.1.tgz\n\nUpdated package for Slackware 10.2:\nftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/ntp-4.2.4p6-i486-1_slack10.2.tgz\n\nUpdated package for Slackware 11.0:\nftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/ntp-4.2.4p6-i486-1_slack11.0.tgz\n\nUpdated package for Slackware 12.0:\nftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/ntp-4.2.4p6-i486-1_slack12.0.tgz\n\nUpdated package for Slackware 12.1:\nftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/ntp-4.2.4p6-i486-1_slack12.1.tgz\n\nUpdated package for Slackware 12.2:\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/ntp-4.2.4p6-i486-1_slack12.2.tgz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.4p6-i486-1.tgz\n\n\nMD5 signatures:\n\nSlackware 8.1 package:\nbe95d635d683bfd19c1c66ef8fe258c1 ntp-4.2.4p6-i386-1_slack8.1.tgz\n\nSlackware 9.0 package:\n3f6e8c29282024f14af9ae9ae0eb5c62 ntp-4.2.4p6-i386-1_slack9.0.tgz\n\nSlackware 9.1 package:\n086b2b0e2d0caf1e2f34327c30a4a5bb ntp-4.2.4p6-i486-1_slack9.1.tgz\n\nSlackware 10.0 package:\n7fcfec9f57c1ab6a70b81d063e58a5e2 ntp-4.2.4p6-i486-1_slack10.0.tgz\n\nSlackware 10.1 package:\n59d6a05ca3e3e78e6c6845e307c55423 ntp-4.2.4p6-i486-1_slack10.1.tgz\n\nSlackware 10.2 package:\n5e43d7c1a34bdd65e808cec06cfb7ca1 ntp-4.2.4p6-i486-1_slack10.2.tgz\n\nSlackware 11.0 package:\n41d99a52c1395cb7d1e56fa5eb2d7fde ntp-4.2.4p6-i486-1_slack11.0.tgz\n\nSlackware 12.0 package:\n1396976a5b8ef4578277a12abcbb56c9 ntp-4.2.4p6-i486-1_slack12.0.tgz\n\nSlackware 12.1 package:\n297b2f95e96e0420088af2aed7213cc5 ntp-4.2.4p6-i486-1_slack12.1.tgz\n\nSlackware 12.2 package:\nd587492d3306a487124cedc45f7d6d4a ntp-4.2.4p6-i486-1_slack12.2.tgz\n\nSlackware -current package:\ne4b51a76744d8c271a9b7324f4355e4c ntp-4.2.4p6-i486-1.tgz\n\n\nInstallation instructions:\n\nUpgrade the package as root:\n > upgradepkg ntp-4.2.4p6-i486-1_slack12.2.tgz", "modified": "2009-01-14T23:15:12", "published": "2009-01-14T23:15:12", "id": "SSA-2009-014-03", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.531177", "type": "slackware", "title": "ntp", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2019-05-30T07:37:16", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5077"], "description": "New openssl packages are available for Slackware 11.0, 12.0, 12.1, 12.2,\nand -current to fix a security issue when connecting to an SSL/TLS server\nthat uses a certificate containing a DSA or ECDSA key.\n\nMore details about this issue may be found here:\n http://www.openssl.org/news/secadv_20090107.txt\n http://www.ocert.org/advisories/ocert-2008-016.html\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077\n\n\nHere are the details from the Slackware 12.2 ChangeLog:\n\npatches/packages/openssl-0.9.8i-i486-2_slack12.2.tgz:\n Patched to fix the return value EVP_VerifyFinal, preventing malformed\n signatures from being considered good. This flaw could possibly allow a\n 'man in the middle' attack.\n For more information, see:\n http://www.openssl.org/news/secadv_20090107.txt\n http://www.ocert.org/advisories/ocert-2008-016.html\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077\n (* Security fix *)\npatches/packages/openssl-solibs-0.9.8i-i486-2_slack12.2.tgz:\n Patched to fix the return value EVP_VerifyFinal, preventing malformed\n signatures from being considered good. This flaw could possibly allow a\n 'man in the middle' attack.\n For more information, see:\n http://www.openssl.org/news/secadv_20090107.txt\n http://www.ocert.org/advisories/ocert-2008-016.html\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077\n (* Security fix *)\n\nWhere to find the new packages:\n\nHINT: Getting slow download speeds from ftp.slackware.com?\nGive slackware.osuosl.org a try. This is another primary FTP site\nfor Slackware that can be considerably faster than downloading\ndirectly from ftp.slackware.com.\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating additional FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the "Get Slack" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 11.0:\nftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/openssl-0.9.8h-i486-2_slack11.0.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/openssl-solibs-0.9.8h-i486-2_slack11.0.tgz\n\nUpdated package for Slackware 12.0:\nftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/openssl-0.9.8h-i486-2_slack12.0.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/openssl-solibs-0.9.8h-i486-2_slack12.0.tgz\n\nUpdated package for Slackware 12.1:\nftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/openssl-0.9.8h-i486-2_slack12.1.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/openssl-solibs-0.9.8h-i486-2_slack12.1.tgz\n\nUpdated package for Slackware 12.2:\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/openssl-0.9.8i-i486-2_slack12.2.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/openssl-solibs-0.9.8i-i486-2_slack12.2.tgz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-0.9.8i-i486-2.tgz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-0.9.8i-i486-2.tgz\n\n\nMD5 signatures:\n\nSlackware 11.0 package:\n7debc62bd78f7fef599452a5a42aafa2 openssl-0.9.8h-i486-2_slack11.0.tgz\nb8ff499bdb6b39af8c9b1dbdd414e719 openssl-solibs-0.9.8h-i486-2_slack11.0.tgz\n\nSlackware 12.0 package:\n028d8569c8c8ff81eb2db2186de977f0 openssl-0.9.8h-i486-2_slack12.0.tgz\nd650635e4eb4d1fa61e6a7dd5e2382b1 openssl-solibs-0.9.8h-i486-2_slack12.0.tgz\n\nSlackware 12.1 package:\nc316ed24bfdf085f601d7f26e4268044 openssl-0.9.8h-i486-2_slack12.1.tgz\n629dfe5fb6576eadb176b1cacfc7261d openssl-solibs-0.9.8h-i486-2_slack12.1.tgz\n\nSlackware 12.2 package:\n79ea770e7d91bfbb1e4bb68fe43b2dee openssl-0.9.8i-i486-2_slack12.2.tgz\n8900bb9731175fe2fef0b8b0869d74d9 openssl-solibs-0.9.8i-i486-2_slack12.2.tgz\n\nSlackware -current package:\n3ac4e878e8f772cc360ddfe26dcabf1e openssl-solibs-0.9.8i-i486-2.tgz\n\n\nInstallation instructions:\n\nUpgrade the packages as root:\n > upgradepkg openssl-0.9.8i-i486-2_slack12.2.tgz openssl-solibs-0.9.8i-i486-2_slack12.2.tgz", "modified": "2009-01-14T23:14:20", "published": "2009-01-14T23:14:20", "id": "SSA-2009-014-01", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.544796", "type": "slackware", "title": "openssl", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:28", "bulletinFamily": "software", "cvelist": ["CVE-2009-0021", "CVE-2008-5077", "CVE-2009-0025"], "description": "#2008-016 multiple OpenSSL signature verification API misuse\r\n\r\nDescription:\r\n\r\nSeveral functions inside the OpenSSL library incorrectly check the result\r\nafter calling the EVP_VerifyFinal function.\r\n\r\nThis bug allows a malformed signature to be treated as a good signature\r\nrather than as an error. This issue affects the signature checks on DSA\r\nand ECDSA keys used with SSL/TLS.\r\n\r\nThe flaw may be exploited by a malicious server or a man-in-the-middle\r\nattack that presents a malformed SSL/TLS signature from a certificate\r\nchain to a vulnerable client, bypassing validation.\r\n\r\nA patch fixing the issue with proper return code checking and further\r\nimportant recommendations are described in the original OpenSSL Team\r\nadvisory.\r\n\r\nAt the request of the OpenSSL team, oCERT has aided in the remediation\r\ncoordination for other projects with similar API misuse vulnerabilities.\r\nIn addition to EVP_VerifyFinal, the return codes from DSA_verify and\r\nDSA_do_verify functions were being incorrectly validated, and packages\r\ndoing so are affected in a similar fashion as OpenSSL.\r\n\r\n\r\nAffected version:\r\n\r\nOpenSSL <= 0.9.8i [1]\r\n\r\nThe following packages were identified as affected by the same OpenSSL\r\nvulnerability, as they use OpenSSL EVP_VerifyFinal function and\r\nincorrectly check the return code.\r\n\r\nNTP <= 4.2.4p5 (production), <= 4.2.5p150 (development)\r\n\r\nSun GridEngine <= 5.3\r\n\r\nGale <= 0.99\r\n\r\nOpenEvidence <= 1.0.6\r\n\r\nBelgian eID middleware - eidlib <= 2.6.0 [2]\r\n\r\nFreedom Network Server <= 2.x\r\n\r\nThe following packages were identified as affected by a vulnerability\r\nsimilar to the OpenSSL one, as they use OpenSSL DSA_verify function and\r\nincorrectly check the return code.\r\n\r\nBIND <= 9.4.3\r\n\r\nLasso <= 2.2.1\r\n\r\nZXID <= 0.29\r\n\r\n1 - use of OpenSSL as an SSL/TLS client when connecting to a server whose\r\ncertificate uses an RSA key is NOT affected. Verification of client\r\ncertificates by OpenSSL servers for any key type is NOT affected.\r\n\r\n2 - Belgian eID middleware latest versions are not available in source\r\nform, therefore we cannot confirm if they are affected\r\n\r\n\r\nFixed version:\r\n\r\nOpenSSL >= 0.9.8j\r\n\r\nNTP >= 4.2.4p6 (production), >= 4.2.5p153 (development)\r\n\r\nSun GridEngine >= 6.0\r\n\r\nGale N/A\r\n\r\nOpenEvidence N/A\r\n\r\nBelgian eID middleware - eidlib N/A\r\n\r\nFreedom Network Server N/A\r\n\r\nBIND >= 9.3.6-P1, 9.4.3-P1, 9.5.1-P1, 9.6.0-P1\r\n\r\nLasso >= 2.2.2\r\n\r\nZXID N/A\r\n\r\n\r\nCredit: Google Security Team (for the original OpenSSL issue).\r\n\r\n\r\nCVE: CVE-2008-5077 (OpenSSL),\r\n CVE-2009-0021 (NTP),\r\n CVE-2009-0025 (BIND)\r\n\r\n\r\nTimeline:\r\n2008-12-16: OpenSSL Security Team requests coordination aid from oCERT\r\n2008-12-16: oCERT investigates packages affected by similar issues\r\n2008-12-16: contacted affected vendors\r\n2008-12-17: investigation expanded to DSA verification\r\n2008-12-17: BIND, Lasso and ZXID added to affected packages\r\n2008-12-18: contacted additional affected vendors\r\n2009-01-05: status updates and patch dissemination to affected vendors\r\n2009-01-05: confirmation from BIND of issue and fix\r\n2009-01-06: requested CVE assignment for BIND\r\n2009-01-07: advisory published\r\n\r\n\r\nReferences:\r\nhttp://openssl.org/news/secadv_20090107.txt\r\n\r\n\r\nLinks:\r\nhttp://openssl.org/\r\nhttp://www.ntp.org/\r\nhttp://gridengine.sunsource.net/\r\nhttp://gale.org/\r\nhttp://www.openevidence.org/\r\nhttp://eid.belgium.be/\r\nhttp://www.google.com/codesearch/p?#1vGzyQX--LU/achilles/remailer/zero-knowledge/freedomserver-2.x.tgz/\r\nhttps://www.isc.org/products/BIND\r\nhttp://lasso.entrouvert.org/\r\nhttp://www.zxid.org/\r\n\r\n\r\nPermalink:\r\nhttp://www.ocert.org/advisories/ocert-2008-016.html\r\n\r\n\r\n--\r\nWill Drewry <redpig@ocert.org>\r\noCERT Team :: http://ocert.org", "edition": 1, "modified": "2009-01-09T00:00:00", "published": "2009-01-09T00:00:00", "id": "SECURITYVULNS:DOC:21113", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:21113", "title": "[oCERT-2008-016] Multiple OpenSSL signature verification API misuses", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:31", "bulletinFamily": "software", "cvelist": ["CVE-2009-0021", "CVE-2008-5077", "CVE-2009-0050", "CVE-2009-0126", "CVE-2009-0025"], "description": "Multiple vulnerabilities in SSL/TLS DSA/ECDSA certificate chain validations.", "edition": 1, "modified": "2009-02-10T00:00:00", "published": "2009-02-10T00:00:00", "id": "SECURITYVULNS:VULN:9564", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9564", "title": "OpenSSL / ntp / bind / boinc certificate validation cryptographic vulnerabilities", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "ubuntu": [{"lastseen": "2020-07-08T23:34:56", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0021"], "description": "It was discovered that NTP did not properly perform signature verification. \nA remote attacker could exploit this to bypass certificate validation via \na malformed SSL/TLS signature.", "edition": 5, "modified": "2009-01-08T00:00:00", "published": "2009-01-08T00:00:00", "id": "USN-705-1", "href": "https://ubuntu.com/security/notices/USN-705-1", "title": "NTP vulnerability", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-07-08T23:34:57", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5077"], "description": "It was discovered that OpenSSL did not properly perform signature verification \non DSA and ECDSA keys. If user or automated system connected to a malicious \nserver or a remote attacker were able to perform a man-in-the-middle attack, \nthis flaw could be exploited to view sensitive information.", "edition": 5, "modified": "2009-01-07T00:00:00", "published": "2009-01-07T00:00:00", "id": "USN-704-1", "href": "https://ubuntu.com/security/notices/USN-704-1", "title": "OpenSSL vulnerability", "type": "ubuntu", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}], "centos": [{"lastseen": "2019-12-20T18:27:16", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0021"], "description": "**CentOS Errata and Security Advisory** CESA-2009:0046\n\n\nThe Network Time Protocol (NTP) is used to synchronize a computer's time\nwith a referenced time source.\n\nA flaw was discovered in the way the ntpd daemon checked the return value\nof the OpenSSL EVP_VerifyFinal function. On systems using NTPv4\nauthentication, this could lead to an incorrect verification of\ncryptographic signatures, allowing time-spoofing attacks. (CVE-2009-0021)\n\nNote: This issue only affects systems that have enabled NTP authentication.\nBy default, NTP authentication is not enabled.\n\nAll ntp users are advised to upgrade to the updated packages, which contain\na backported patch to resolve this issue. After installing the update, the\nntpd daemon will restart automatically.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-April/027792.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-April/027793.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027640.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027641.html\n\n**Affected packages:**\nntp\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2009-0046.html", "edition": 3, "modified": "2009-04-09T17:43:49", "published": "2009-02-04T18:58:29", "href": "http://lists.centos.org/pipermail/centos-announce/2009-February/027640.html", "id": "CESA-2009:0046", "title": "ntp security update", "type": "centos", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-12-20T18:25:41", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5077"], "description": "**CentOS Errata and Security Advisory** CESA-2009:0004-01\n\n\nOpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and\nTransport Layer Security (TLS v1) protocols as well as a full-strength,\ngeneral purpose, cryptography library.\n\nThe Google security team discovered a flaw in the way OpenSSL checked the\nverification of certificates. An attacker in control of a malicious server,\nor able to effect a \"man in the middle\" attack, could present a malformed\nSSL/TLS signature from a certificate chain to a vulnerable client and\nbypass validation. (CVE-2008-5077)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall running OpenSSL client applications must be restarted, or the system\nrebooted.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027612.html\n\n**Affected packages:**\nopenssl\nopenssl-devel\nopenssl-perl\nopenssl095a\nopenssl096\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/rh21as-errata.html", "edition": 4, "modified": "2009-02-02T23:30:18", "published": "2009-02-02T23:30:18", "href": "http://lists.centos.org/pipermail/centos-announce/2009-February/027612.html", "id": "CESA-2009:0004-01", "title": "openssl, openssl095a, openssl096 security update", "type": "centos", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-12-08T03:32:47", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5077"], "description": "**CentOS Errata and Security Advisory** CESA-2009:0004\n\n\nOpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and\nTransport Layer Security (TLS v1) protocols as well as a full-strength,\ngeneral purpose, cryptography library.\n\nThe Google security team discovered a flaw in the way OpenSSL checked the\nverification of certificates. An attacker in control of a malicious server,\nor able to effect a \"man in the middle\" attack, could present a malformed\nSSL/TLS signature from a certificate chain to a vulnerable client and\nbypass validation. (CVE-2008-5077)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall running OpenSSL client applications must be restarted, or the system\nrebooted.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027634.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027636.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027649.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027653.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-January/027560.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-January/027561.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-January/027570.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-January/027571.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-January/027600.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-January/027601.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-January/039907.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-January/039908.html\n\n**Affected packages:**\nopenssl\nopenssl-devel\nopenssl-perl\nopenssl096b\nopenssl097a\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2009-0004.html", "edition": 7, "modified": "2009-02-05T15:56:11", "published": "2009-01-07T22:28:50", "href": "http://lists.centos.org/pipermail/centos-announce/2009-January/027560.html", "id": "CESA-2009:0004", "title": "openssl, openssl096b, openssl097a security update", "type": "centos", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}], "debian": [{"lastseen": "2020-11-11T13:17:34", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0021"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1702-1 security@debian.org\nhttp://www.debian.org/security/ Florian Weimer\nJanuary 12, 2009 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : ntp\nVulnerability : interpretation conflict\nProblem type : remote\nDebian-specific: no\nCVE Id(s) : CVE-2009-0021\nDebian Bug : 511227\n\nIt has been discovered that NTP, an implementation of the Network Time\nProtocol, does not properly check the result of an OpenSSL function\nfor verifying cryptographic signatures, which may ultimately lead to\nthe acceptance of unauthenticated time information. (Note that\ncryptographic authentication of time servers is often not enabled in\nthe first place.)\n\nFor the stable distribution (etch), this problem has been fixed in\nversion 4.2.2.p4+dfsg-2etch1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 4.2.4p4+dfsg-8.\n\nThe testing distribution (lenny) will be fixed soon.\n\nWe recommend that you upgrade your ntp package.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.2.p4+dfsg-2etch1.dsc\n Size/MD5 checksum: 906 e0ae8fa9aad8606ad51a06511159c27d\n http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.2.p4+dfsg.orig.tar.gz\n Size/MD5 checksum: 2199764 ad746cda2d90dbb9ed06fe164273c5d0\n http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.2.p4+dfsg-2etch1.diff.gz\n Size/MD5 checksum: 176270 339515bd8d7e653a9fedb2bcad03bb74\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/n/ntp/ntp-doc_4.2.2.p4+dfsg-2etch1_all.deb\n Size/MD5 checksum: 910396 fc7d395c11365e371d58da5ab0d34bba\n http://security.debian.org/pool/updates/main/n/ntp/ntp-simple_4.2.2.p4+dfsg-2etch1_all.deb\n Size/MD5 checksum: 28380 4b4c4955ecd354a4bc884027786c368f\n http://security.debian.org/pool/updates/main/n/ntp/ntp-refclock_4.2.2.p4+dfsg-2etch1_all.deb\n Size/MD5 checksum: 28382 31adec52e5d82d9d3026a41b37dc6936\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.2.p4+dfsg-2etch1_alpha.deb\n Size/MD5 checksum: 64790 9f577a186d01ad00e9882cd3424d2cac\n http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.2.p4+dfsg-2etch1_alpha.deb\n Size/MD5 checksum: 407826 3e07d1ea475302dd39019d1bdc982ce7\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.2.p4+dfsg-2etch1_amd64.deb\n Size/MD5 checksum: 61274 0aedd7774998dfb1641860d66821af35\n http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.2.p4+dfsg-2etch1_amd64.deb\n Size/MD5 checksum: 359176 a0e6375e933a8e591f34122fdf8b2bb0\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.2.p4+dfsg-2etch1_hppa.deb\n Size/MD5 checksum: 61736 9230c434db7c6b89c8ca032262653d91\n http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.2.p4+dfsg-2etch1_hppa.deb\n Size/MD5 checksum: 373162 36909f95cddcfda62096aa9052441189\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.2.p4+dfsg-2etch1_i386.deb\n Size/MD5 checksum: 328564 91103db311d21a9da3fa7fbd3c3d076a\n http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.2.p4+dfsg-2etch1_i386.deb\n Size/MD5 checksum: 57832 fc544d64adaac58dde6aef81a18a70fa\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.2.p4+dfsg-2etch1_ia64.deb\n Size/MD5 checksum: 74470 19e2e2b4124a7ca1a82e43a29b3b99b5\n http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.2.p4+dfsg-2etch1_ia64.deb\n Size/MD5 checksum: 523072 9b004e17c3541978ee1abdf2e02494bb\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.2.p4+dfsg-2etch1_mipsel.deb\n Size/MD5 checksum: 389912 45526855df18c76e2eb826983c3d450f\n http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.2.p4+dfsg-2etch1_mipsel.deb\n Size/MD5 checksum: 63888 5bbabab2a3c5571b3c2fd82a80bb5582\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.2.p4+dfsg-2etch1_powerpc.deb\n Size/MD5 checksum: 358632 187ec033929b189b6cd3dcb3f9377fbf\n http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.2.p4+dfsg-2etch1_powerpc.deb\n Size/MD5 checksum: 61452 3e0560060aee1113105db444eddad1be\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.2.p4+dfsg-2etch1_s390.deb\n Size/MD5 checksum: 60998 2dd5ba10abba0a55e5f22c76b67460fb\n http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.2.p4+dfsg-2etch1_s390.deb\n Size/MD5 checksum: 349954 adeac4a7f39c3a2e945cfaf76e8159dc\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/n/ntp/ntp_4.2.2.p4+dfsg-2etch1_sparc.deb\n Size/MD5 checksum: 331972 a56d5e21ed84396f7439d7d49a5884ab\n http://security.debian.org/pool/updates/main/n/ntp/ntpdate_4.2.2.p4+dfsg-2etch1_sparc.deb\n Size/MD5 checksum: 58316 78936a99f622964adb9f08f1739f77c9\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 11, "modified": "2009-01-12T20:34:35", "published": "2009-01-12T20:34:35", "id": "DEBIAN:DSA-1702-1:D3B79", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2009/msg00009.html", "title": "[SECURITY] [DSA 1702-1] New ntp packages fix cryptographic weakness", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "redhat": [{"lastseen": "2019-08-13T18:45:02", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0021"], "description": "The Network Time Protocol (NTP) is used to synchronize a computer's time\nwith a referenced time source.\n\nA flaw was discovered in the way the ntpd daemon checked the return value\nof the OpenSSL EVP_VerifyFinal function. On systems using NTPv4\nauthentication, this could lead to an incorrect verification of\ncryptographic signatures, allowing time-spoofing attacks. (CVE-2009-0021)\n\nNote: This issue only affects systems that have enabled NTP authentication.\nBy default, NTP authentication is not enabled.\n\nAll ntp users are advised to upgrade to the updated packages, which contain\na backported patch to resolve this issue. After installing the update, the\nntpd daemon will restart automatically.", "modified": "2017-09-08T12:19:31", "published": "2009-01-29T05:00:00", "id": "RHSA-2009:0046", "href": "https://access.redhat.com/errata/RHSA-2009:0046", "type": "redhat", "title": "(RHSA-2009:0046) Moderate: ntp security update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:38:22", "bulletinFamily": "unix", "cvelist": ["CVE-2009-0021"], "description": "[4.2.2p1-9.el5_3.1]\n- fix check for malformed signatures (#479698, CVE-2009-0021)", "edition": 4, "modified": "2009-01-29T00:00:00", "published": "2009-01-29T00:00:00", "id": "ELSA-2009-0046", "href": "http://linux.oracle.com/errata/ELSA-2009-0046.html", "title": "ntp security update", "type": "oraclelinux", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "seebug": [{"lastseen": "2017-11-19T19:01:45", "description": "BUGTRAQ ID: 33150\r\nCVE ID\uff1aCVE-2008-5077\r\nCNCVE ID\uff1aCNCVE-20085077\r\n\r\nOpenSSL\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u7801\u7684SSL\u5b9e\u73b0\uff0c\u7528\u6765\u5b9e\u73b0\u7f51\u7edc\u901a\u4fe1\u7684\u9ad8\u5f3a\u5ea6\u52a0\u5bc6\u3002\r\n\u90e8\u5206OpenSSL\u51fd\u6570\u9a8c\u8bc1DSA\u548cECDSA\u5bc6\u94a5\u65f6\u4e0d\u6b63\u786e\u9a8c\u8bc1"EVP_VerifyFinal()"\u51fd\u6570\u8fd4\u56de\u503c\uff0c\u53d1\u9001\u7279\u6b8a\u6784\u5efa\u7684\u7b7e\u540d\u8bc1\u4e66\u94fe\u7ed9\u5ba2\u6237\u7aef\uff0c\u53ef\u7ed5\u8fc7\u7b7e\u540d\u68c0\u67e5\u3002\r\n\u901a\u8fc7\u6076\u610f\u670d\u52a1\u5668\u6216\u4e2d\u95f4\u4eba\u653b\u51fb\uff0c\u53ef\u4f7f\u8bc1\u4e66\u94fe\u4e2d\u7684\u7578\u5f62SSL/TLS\u7b7e\u540d\u7ed5\u8fc7\u5ba2\u6237\u7aef\u8f6f\u4ef6\u68c0\u67e5\uff0c\u5bfc\u81f4\u76f2\u76ee\u4fe1\u4efb\u5e76\u6cc4\u6f0f\u654f\u611f\u4fe1\u606f\u3002\r\n\u6210\u529f\u5229\u7528\u6b64\u6f0f\u6d1e\u9700\u8981\u670d\u52a1\u5668\u4f7f\u7528\u5305\u542bDSA\u6216\u8005ECDSA\u5bc6\u94a5\u7684\u8bc1\u4e66\u3002\n\nUbuntu Ubuntu Linux 8.10 sparc\r\nUbuntu Ubuntu Linux 8.10 powerpc\r\nUbuntu Ubuntu Linux 8.10 lpia\r\nUbuntu Ubuntu Linux 8.10 i386\r\nUbuntu Ubuntu Linux 8.10 amd64\r\nUbuntu Ubuntu Linux 8.04 LTS sparc\r\nUbuntu Ubuntu Linux 8.04 LTS powerpc\r\nUbuntu Ubuntu Linux 8.04 LTS lpia\r\nUbuntu Ubuntu Linux 8.04 LTS i386\r\nUbuntu Ubuntu Linux 8.04 LTS amd64\r\nUbuntu Ubuntu Linux 7.10 sparc\r\nUbuntu Ubuntu Linux 7.10 powerpc\r\nUbuntu Ubuntu Linux 7.10 lpia\r\nUbuntu Ubuntu Linux 7.10 i386\r\nUbuntu Ubuntu Linux 7.10 amd64\r\nUbuntu Ubuntu Linux 6.06 LTS sparc\r\nUbuntu Ubuntu Linux 6.06 LTS powerpc\r\nUbuntu Ubuntu Linux 6.06 LTS i386\r\nUbuntu Ubuntu Linux 6.06 LTS amd64\r\nSun Grid Engine 5.3 x86\r\nSun Grid Engine 5.3 Sun Linux\r\nSun Grid Engine 5.3 64-bit SPARC\r\nSun Grid Engine 5.3 32-bit SPARC\r\nSun Grid Engine 5.3 \r\nRedHat Enterprise Linux WS 4\r\nRedHat Enterprise Linux WS 3\r\nRedHat Enterprise Linux WS 2.1 IA64\r\nRedHat Enterprise Linux WS 2.1\r\nRedHat Enterprise Linux ES 4\r\nRedHat Enterprise Linux ES 3\r\nRedHat Enterprise Linux ES 2.1 IA64\r\nRedHat Enterprise Linux ES 2.1\r\nRedHat Enterprise Linux Desktop Workstation 5 client\r\nRedHat Enterprise Linux Desktop 5 client\r\nRedHat Enterprise Linux AS 4\r\nRedHat Enterprise Linux AS 3\r\nRedHat Enterprise Linux AS 2.1 IA64\r\nRedHat Enterprise Linux AS 2.1\r\nRedHat Enterprise Linux 5 server\r\nRedHat Desktop 3.0 \r\nOpenSSL Project OpenSSL 0.9.8 i\r\nOpenSSL Project OpenSSL 0.9.8 e\r\nOpenSSL Project OpenSSL 0.9.8 d\r\nOpenSSL Project OpenSSL 0.9.8 c\r\nOpenSSL Project OpenSSL 0.9.8 b\r\nOpenSSL Project OpenSSL 0.9.8 a\r\nOpenSSL Project OpenSSL 0.9.8 \r\n+ Gentoo Linux \r\nOpenSSL Project OpenSSL 0.9.7 m\r\nOpenSSL Project OpenSSL 0.9.7 l\r\nOpenSSL Project OpenSSL 0.9.7 k\r\nOpenSSL Project OpenSSL 0.9.7 j\r\nOpenSSL Project OpenSSL 0.9.7 i\r\nOpenSSL Project OpenSSL 0.9.7 h\r\nOpenSSL Project OpenSSL 0.9.7 g\r\nOpenSSL Project OpenSSL 0.9.7 f\r\nOpenSSL Project OpenSSL 0.9.7 e\r\nOpenSSL Project OpenSSL 0.9.7 d\r\nOpenSSL Project OpenSSL 0.9.7 c\r\n+ OpenPKG OpenPKG 2.0 \r\n+ Slackware Linux 9.1 \r\n+ Slackware Linux 9.0 \r\n+ Slackware Linux -current\r\nOpenSSL Project OpenSSL 0.9.7 beta3\r\nOpenSSL Project OpenSSL 0.9.7 beta2\r\nOpenSSL Project OpenSSL 0.9.7 beta1\r\nOpenSSL Project OpenSSL 0.9.7 b\r\n+ OpenPKG OpenPKG 1.3 \r\nOpenSSL Project OpenSSL 0.9.7 a\r\n+ Conectiva Linux 9.0 \r\n+ OpenPKG OpenPKG Current\r\nOpenSSL Project OpenSSL 0.9.7 \r\nOpenSSL Project OpenSSL 0.9.6 m\r\nOpenSSL Project OpenSSL 0.9.6 l\r\nOpenSSL Project OpenSSL 0.9.6 k\r\nOpenSSL Project OpenSSL 0.9.6 j\r\nOpenSSL Project OpenSSL 0.9.6 i\r\nOpenSSL Project OpenSSL 0.9.6 h\r\nOpenSSL Project OpenSSL 0.9.6 g\r\n+ Conectiva Linux Enterprise Edition 1.0 \r\n+ FreeBSD FreeBSD 4.7 -RELEASE\r\n+ FreeBSD FreeBSD 4.7 \r\n+ HP Apache-Based Web Server 2.0.43 .04\r\n+ HP Apache-Based Web Server 2.0.43 .00\r\n+ HP Webmin-Based Admin 1.0 .01\r\n+ Immunix Immunix OS 7+\r\n+ NetBSD NetBSD 1.6 \r\n+ OpenPKG OpenPKG 1.1 \r\nOpenSSL Project OpenSSL 0.9.6 f\r\nOpenSSL Project OpenSSL 0.9.6 e\r\n+ FreeBSD FreeBSD 4.6 -RELEASE\r\n+ FreeBSD FreeBSD 4.6 \r\nOpenSSL Project OpenSSL 0.9.6 d\r\n+ Slackware Linux 8.1 \r\nOpenSSL Project OpenSSL 0.9.6 c\r\n+ Conectiva Linux 8.0 \r\n+ Debian Linux 3.0 sparc\r\n+ Debian Linux 3.0 s/390\r\n+ Debian Linux 3.0 ppc\r\n+ Debian Linux 3.0 mipsel\r\n+ Debian Linux 3.0 mips\r\n+ Debian Linux 3.0 m68k\r\n+ Debian Linux 3.0 ia-64\r\n+ Debian Linux 3.0 ia-32\r\n+ Debian Linux 3.0 hppa\r\n+ Debian Linux 3.0 arm\r\n+ Debian Linux 3.0 alpha\r\n+ Debian Linux 3.0 \r\n+ MandrakeSoft Linux Mandrake 8.2 \r\n+ S.u.S.E. Linux 8.0 i386\r\n+ S.u.S.E. Linux 8.0 \r\nOpenSSL Project OpenSSL 0.9.6 b-36.8\r\nOpenSSL Project OpenSSL 0.9.6 b\r\n+ MandrakeSoft Linux Mandrake 8.1 ia64\r\n+ MandrakeSoft Linux Mandrake 8.1 \r\n+ OpenBSD OpenBSD 3.1\r\n+ OpenBSD OpenBSD 3.0\r\n+ RedHat Enterprise Linux AS 2.1 IA64\r\n+ RedHat Enterprise Linux AS 2.1\r\n+ RedHat Enterprise Linux ES 2.1 IA64\r\n+ RedHat Enterprise Linux ES 2.1\r\n+ RedHat Enterprise Linux WS 2.1 IA64\r\n+ RedHat Enterprise Linux WS 2.1\r\n+ RedHat Linux 7.3 i386\r\n+ RedHat Linux 7.3 \r\n+ RedHat Linux 7.2 ia64\r\n+ RedHat Linux 7.2 i686\r\n+ RedHat Linux 7.2 i386\r\n+ RedHat Linux 7.2 \r\n+ RedHat Linux Advanced Work Station 2.1 \r\n+ S.u.S.E. Linux 7.3 sparc\r\n+ S.u.S.E. Linux 7.3 ppc\r\n+ S.u.S.E. Linux 7.3 i386\r\n+ S.u.S.E. Linux Connectivity Server \r\n+ S.u.S.E. Linux Database Server 0\r\n+ S.u.S.E. Linux Enterprise Server 7\r\n+ S.u.S.E. Linux Firewall on CD \r\n+ S.u.S.E. Office Server \r\n+ S.u.S.E. SuSE eMail Server III \r\n+ Sun Linux 5.0.7 \r\n+ Sun Linux 5.0.6 \r\n+ Sun Linux 5.0.5 \r\n+ Sun Linux 5.0.3 \r\n+ Sun Linux 5.0 \r\nOpenSSL Project OpenSSL 0.9.6 a\r\n+ Conectiva Linux 7.0 \r\n+ NetBSD NetBSD 1.5.3 \r\n+ NetBSD NetBSD 1.5.2 \r\n+ NetBSD NetBSD 1.5.1 \r\n+ NetBSD NetBSD 1.5 \r\n+ S.u.S.E. Linux 7.2 i386\r\n+ S.u.S.E. Linux 7.1 sparc\r\n+ S.u.S.E. Linux 7.1 ppc\r\n+ S.u.S.E. Linux 7.1 alpha\r\n+ S.u.S.E. Linux 7.1 \r\nOpenSSL Project OpenSSL 0.9.6 \r\n+ Caldera OpenLinux Server 3.1.1 \r\n+ Caldera OpenLinux Server 3.1 \r\n+ Caldera OpenLinux Workstation 3.1.1 \r\n+ Caldera OpenLinux Workstation 3.1 \r\n+ Conectiva Linux 6.0 \r\n+ EnGarde Secure Linux 1.0.1 \r\n+ HP Secure OS software for Linux 1.0 \r\n+ MandrakeSoft Linux Mandrake 8.0 ppc\r\n+ MandrakeSoft Linux Mandrake 8.0 \r\n+ NetBSD NetBSD 1.6 beta\r\n+ NetBSD NetBSD 1.6 \r\n+ NetBSD NetBSD 1.5.3 \r\n+ NetBSD NetBSD 1.5.2 \r\n+ NetBSD NetBSD 1.5.1 \r\n+ NetBSD NetBSD 1.5 \r\n+ OpenBSD OpenBSD 2.9 \r\n+ OpenPKG OpenPKG 1.0 \r\n+ RedHat Linux 7.3 i386\r\n+ RedHat Linux 7.3 \r\n+ RedHat Linux 7.2 i386\r\n+ RedHat Linux 7.2 alpha\r\n+ RedHat Linux 7.1 i386\r\n+ RedHat Linux 7.1 alpha\r\n+ RedHat Linux 7.0 sparc\r\n+ RedHat Linux 7.0 i386\r\n+ RedHat Linux 7.0 alpha\r\n+ Trustix Secure Linux 1.5 \r\n+ Trustix Secure Linux 1.2 \r\n+ Trustix Secure Linux 1.1 \r\nOpenSSL Project OpenSSL 0.9.5 a\r\n+ Debian Linux 3.0 \r\n+ HP Secure OS software for Linux 1.0 \r\n+ Immunix Immunix OS 7.0 \r\n+ Immunix Immunix OS 6.2 \r\n+ MandrakeSoft Corporate Server 1.0.1 \r\n+ MandrakeSoft Linux Mandrake 7.2 \r\n+ MandrakeSoft Linux Mandrake 7.1 \r\n+ MandrakeSoft Single Network Firewall 7.2 \r\n+ OpenBSD OpenBSD 2.8 \r\n+ OpenBSD OpenBSD 2.7 \r\n+ RedHat Linux 7.3 i386\r\n+ RedHat Linux 7.2 ia64\r\n+ RedHat Linux 7.2 i686\r\n+ RedHat Linux 7.2 i386\r\n+ RedHat Linux 7.2 alpha\r\n+ RedHat Linux 7.2 \r\n+ RedHat Linux 7.1 ia64\r\n+ RedHat Linux 7.1 i386\r\n+ RedHat Linux 7.1 alpha\r\n+ RedHat Linux 7.1 \r\n+ RedHat Linux 7.0 i386\r\n+ RedHat Linux 7.0 alpha\r\n+ RedHat Linux 7.0 \r\n+ RedHat Linux 6.2 sparc\r\n+ RedHat Linux 6.2 i386\r\n+ RedHat Linux 6.2 alpha\r\n+ RedHat Linux 6.2 \r\n+ S.u.S.E. Linux 7.0 sparc\r\n+ S.u.S.E. Linux 7.0 ppc\r\n+ S.u.S.E. Linux 7.0 i386\r\n+ S.u.S.E. Linux 7.0 alpha\r\nOpenSSL Project OpenSSL 0.9.5 \r\n+ RedHat Linux 6.2 sparc\r\n+ RedHat Linux 6.2 i386\r\n+ RedHat Linux 6.2 alpha\r\nOpenSSL Project OpenSSL 0.9.4 \r\nOpenSSL Project OpenSSL 0.9.3 \r\nOpenSSL Project OpenSSL 0.9.2 b\r\nOpenSSL Project OpenSSL 0.9.1 c\r\nOpenSSL Project OpenSSL 0.9.8h\r\nOpenSSL Project OpenSSL 0.9.8g\r\nOpenSSL Project OpenSSL 0.9.8f\r\nOpenSSL Project OpenSSL 0.9.8 f\r\nNTP NTP 4.2.5 p150\r\nNTP NTP 4.2.4 p5\r\nGale Gale 0.99\r\nFreeBSD FreeBSD 7.1-STABLE\r\nFreeBSD FreeBSD 7.1 -RELEASE-p1\r\nFreeBSD FreeBSD 7.1 -PRE-RELEASE\r\nFreeBSD FreeBSD 7.0-STABLE\r\nFreeBSD FreeBSD 7.0-RELEASE-p8\r\nFreeBSD FreeBSD 7.0-RELEASE\r\nFreeBSD FreeBSD 7.0 BETA4\r\nFreeBSD FreeBSD 7.0 -RELENG\r\nFreeBSD FreeBSD 7.0 -PRERELEASE\r\nFreeBSD FreeBSD 7.0\r\nFreeBSD FreeBSD 6.4-RELEASE-p2\r\nFreeBSD FreeBSD 6.4 -STABLE\r\nFreeBSD FreeBSD 6.4 -RELEASE\r\nFreeBSD FreeBSD 6.3 -RELENG\r\nFreeBSD FreeBSD 6.3 -RELEASE-p8\r\nFreeBSD FreeBSD 6.3 -RELEASE-p6\r\nFreeBSD FreeBSD 6.3\r\nFreeBSD FreeBSD 6.2 -STABLE\r\nFreeBSD FreeBSD 6.2 -RELENG\r\nFreeBSD FreeBSD 6.2\r\n \r\n\u4e0d\u53d7\u5f71\u54cd\u7cfb\u7edf\r\nSun Grid Engine 6.0\r\nOpenSSL Project OpenSSL 0.9.8 j\r\nNTP NTP 4.2.5 p153\r\nNTP NTP 4.2.4 p6\r\n\n \u5382\u5546\u89e3\u51b3\u65b9\u6848\r\n\u53ef\u53c2\u8003\u5982\u4e0b\u8865\u4e01\u6216\u5347\u7ea7\u7a0b\u5e8f\uff1a\r\nFreeBSD FreeBSD 6.3\r\nFreeBSD openssl6.patch\r\n<a href=http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch</a>\r\nUbuntu Ubuntu Linux 7.10 powerpc\r\nUbuntu libcrypto0.9.8-udeb_0.9.8e-5ubuntu3.3_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8e-5ubuntu3.3_powerpc.udeb\r\nUbuntu libssl-dev_0.9.8e-5ubuntu3.3_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> e-5ubuntu3.3_powerpc.deb\r\nUbuntu libssl0.9.8-dbg_0.9.8e-5ubuntu3.3_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8e-5ubuntu3.3_powerpc.deb\r\nUbuntu libssl0.9.8_0.9.8e-5ubuntu3.3_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8e-5ubuntu3.3_powerpc.deb\r\nUbuntu openssl_0.9.8e-5ubuntu3.3_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5</a> ubuntu3.3_powerpc.deb\r\nUbuntu Ubuntu Linux 8.04 LTS powerpc\r\nUbuntu libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.4_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g</a> -4ubuntu3.4_powerpc.udeb\r\nUbuntu libssl-dev_0.9.8g-4ubuntu3.4_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3 target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3</a> .4_powerpc.deb\r\nUbuntu libssl0.9.8-dbg_0.9.8g-4ubuntu3.4_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ub target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ub</a> untu3.4_powerpc.deb\r\nUbuntu libssl0.9.8_0.9.8g-4ubuntu3.4_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu</a> 3.4_powerpc.deb\r\nUbuntu openssl-doc_0.9.8g-4ubuntu3.4_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-4ubuntu3.4_all.deb\r\nUbuntu openssl_0.9.8g-4ubuntu3.4_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.4_ target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.4_</a> powerpc.deb\r\nUbuntu Ubuntu Linux 8.10 powerpc\r\nUbuntu libcrypto0.9.8-udeb_0.9.8g-10.1ubuntu2.1_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g</a> -10.1ubuntu2.1_powerpc.udeb\r\nUbuntu libssl-dev_0.9.8g-10.1ubuntu2.1_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-10.1ubun target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-10.1ubun</a> tu2.1_powerpc.deb\r\nUbuntu libssl0.9.8-dbg_0.9.8g-10.1ubuntu2.1_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10. target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10.</a> 1ubuntu2.1_powerpc.deb\r\nUbuntu libssl0.9.8_0.9.8g-10.1ubuntu2.1_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1ubu target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1ubu</a> ntu2.1_powerpc.deb\r\nUbuntu openssl-doc_0.9.8g-10.1ubuntu2.1_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-10.1ubuntu2.1_all.deb\r\nUbuntu openssl_0.9.8g-10.1ubuntu2.1_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-10.1ubuntu2 target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-10.1ubuntu2</a> .1_powerpc.deb\r\nUbuntu Ubuntu Linux 8.04 LTS sparc\r\nUbuntu libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.4_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g</a> -4ubuntu3.4_sparc.udeb\r\nUbuntu libssl-dev_0.9.8g-4ubuntu3.4_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3 target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3</a> .4_sparc.deb\r\nUbuntu libssl0.9.8-dbg_0.9.8g-4ubuntu3.4_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ub target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ub</a> untu3.4_sparc.deb\r\nUbuntu libssl0.9.8_0.9.8g-4ubuntu3.4_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu</a> 3.4_sparc.deb\r\nUbuntu openssl-doc_0.9.8g-4ubuntu3.4_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-4ubuntu3.4_all.deb\r\nUbuntu openssl_0.9.8g-4ubuntu3.4_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.4_ target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.4_</a> sparc.deb\r\nUbuntu Ubuntu Linux 6.06 LTS sparc\r\nUbuntu libcrypto0.9.8-udeb_0.9.8a-7ubuntu0.6_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8a-7ubuntu0.6_sparc.udeb\r\nUbuntu libssl-dev_0.9.8a-7ubuntu0.6_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> a-7ubuntu0.6_sparc.deb\r\nUbuntu libssl0.9.8-dbg_0.9.8a-7ubuntu0.6_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8a-7ubuntu0.6_sparc.deb\r\nUbuntu libssl0.9.8_0.9.8a-7ubuntu0.6_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8a-7ubuntu0.6_sparc.deb\r\nUbuntu openssl_0.9.8a-7ubuntu0.6_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8a-7 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8a-7</a> ubuntu0.6_sparc.deb\r\nOpenSSL Project OpenSSL 0.9.8g\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nUbuntu Ubuntu Linux 8.04 LTS amd64\r\nUbuntu libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.4_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8g-4ubuntu3.4_amd64.udeb\r\nUbuntu libssl-dev_0.9.8g-4ubuntu3.4_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> g-4ubuntu3.4_amd64.deb\r\nUbuntu libssl0.9.8-dbg_0.9.8g-4ubuntu3.4_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8g-4ubuntu3.4_amd64.deb\r\nUbuntu libssl0.9.8_0.9.8g-4ubuntu3.4_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8g-4ubuntu3.4_amd64.deb\r\nUbuntu openssl-doc_0.9.8g-4ubuntu3.4_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-4ubuntu3.4_all.deb\r\nUbuntu openssl_0.9.8g-4ubuntu3.4_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4</a> ubuntu3.4_amd64.deb\r\nFreeBSD FreeBSD 7.0-RELEASE\r\nFreeBSD openssl.patch\r\n<a href=http://security.FreeBSD.org/patches/SA-09:02/openssl.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl.patch</a>\r\nUbuntu Ubuntu Linux 7.10 sparc\r\nUbuntu libcrypto0.9.8-udeb_0.9.8e-5ubuntu3.3_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8e-5ubuntu3.3_sparc.udeb\r\nUbuntu libssl-dev_0.9.8e-5ubuntu3.3_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> e-5ubuntu3.3_sparc.deb\r\nUbuntu libssl0.9.8-dbg_0.9.8e-5ubuntu3.3_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8e-5ubuntu3.3_sparc.deb\r\nUbuntu libssl0.9.8_0.9.8e-5ubuntu3.3_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8e-5ubuntu3.3_sparc.deb\r\nUbuntu openssl_0.9.8e-5ubuntu3.3_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5</a> ubuntu3.3_sparc.deb\r\nFreeBSD FreeBSD 6.4 -STABLE\r\nFreeBSD openssl6.patch\r\n<a href=http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch</a>\r\nUbuntu Ubuntu Linux 8.10 sparc\r\nUbuntu libcrypto0.9.8-udeb_0.9.8g-10.1ubuntu2.1_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g</a> -10.1ubuntu2.1_sparc.udeb\r\nUbuntu libssl-dev_0.9.8g-10.1ubuntu2.1_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-10.1ubun target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-10.1ubun</a> tu2.1_sparc.deb\r\nUbuntu libssl0.9.8-dbg_0.9.8g-10.1ubuntu2.1_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10. target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10.</a> 1ubuntu2.1_sparc.deb\r\nUbuntu libssl0.9.8_0.9.8g-10.1ubuntu2.1_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1ubu target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1ubu</a> ntu2.1_sparc.deb\r\nUbuntu openssl-doc_0.9.8g-10.1ubuntu2.1_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-10.1ubuntu2.1_all.deb\r\nUbuntu openssl_0.9.8g-10.1ubuntu2.1_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-10.1ubuntu2 target=_blank rel=external nofollow>http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-10.1ubuntu2</a> .1_sparc.deb\r\nFreeBSD FreeBSD 7.1-STABLE\r\nFreeBSD openssl.patch\r\n<a href=http://security.FreeBSD.org/patches/SA-09:02/openssl.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl.patch</a>\r\nFreeBSD FreeBSD 6.3 -RELENG\r\nFreeBSD openssl6.patch\r\n<a href=http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch target=_blank rel=external nofollow>http://security.FreeBSD.org/patches/SA-09:02/openssl6.patch</a>\r\nOpenSSL Project OpenSSL 0.9.8h\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nUbuntu Ubuntu Linux 8.10 amd64\r\nUbuntu libcrypto0.9.8-udeb_0.9.8g-10.1ubuntu2.1_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8g-10.1ubuntu2.1_amd64.udeb\r\nUbuntu libssl-dev_0.9.8g-10.1ubuntu2.1_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> g-10.1ubuntu2.1_amd64.deb\r\nUbuntu libssl0.9.8-dbg_0.9.8g-10.1ubuntu2.1_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8g-10.1ubuntu2.1_amd64.deb\r\nUbuntu libssl0.9.8_0.9.8g-10.1ubuntu2.1_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8g-10.1ubuntu2.1_amd64.deb\r\nUbuntu openssl-doc_0.9.8g-10.1ubuntu2.1_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-10.1ubuntu2.1_all.deb\r\nUbuntu openssl_0.9.8g-10.1ubuntu2.1_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-1 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-1</a> 0.1ubuntu2.1_amd64.deb\r\nOpenSSL Project OpenSSL 0.9.8f\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nUbuntu Ubuntu Linux 8.10 i386\r\nUbuntu libcrypto0.9.8-udeb_0.9.8g-10.1ubuntu2.1_i386.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8g-10.1ubuntu2.1_i386.udeb\r\nUbuntu libssl-dev_0.9.8g-10.1ubuntu2.1_i386.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> g-10.1ubuntu2.1_i386.deb\r\nUbuntu libssl0.9.8-dbg_0.9.8g-10.1ubuntu2.1_i386.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8g-10.1ubuntu2.1_i386.deb\r\nUbuntu libssl0.9.8_0.9.8g-10.1ubuntu2.1_i386.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8g-10.1ubuntu2.1_i386.deb\r\nUbuntu openssl-doc_0.9.8g-10.1ubuntu2.1_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.</a> 8g-10.1ubuntu2.1_all.deb\r\nUbuntu openssl_0.9.8g-10.1ubuntu2.1_i386.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-1 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-1</a> 0.1ubuntu2.1_i386.deb\r\nOpenSSL Project OpenSSL 0.9.8 f\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nUbuntu Ubuntu Linux 6.06 LTS powerpc\r\nUbuntu libcrypto0.9.8-udeb_0.9.8a-7ubuntu0.6_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-u</a> deb_0.9.8a-7ubuntu0.6_powerpc.udeb\r\nUbuntu libssl-dev_0.9.8a-7ubuntu0.6_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8</a> a-7ubuntu0.6_powerpc.deb\r\nUbuntu libssl0.9.8-dbg_0.9.8a-7ubuntu0.6_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_ target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_</a> 0.9.8a-7ubuntu0.6_powerpc.deb\r\nUbuntu libssl0.9.8_0.9.8a-7ubuntu0.6_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9. target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.</a> 8a-7ubuntu0.6_powerpc.deb\r\nUbuntu openssl_0.9.8a-7ubuntu0.6_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8a-7 target=_blank rel=external nofollow>http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8a-7</a> ubuntu0.6_powerpc.deb\r\nOpenSSL Project OpenSSL 0.9.1 c\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.2 b\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.3 \r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.5 a\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.5 \r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.6 j\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.6 d\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.6 c\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.6 b-36.8\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.6 e\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.6 h\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.6 a\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.6 \r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.6 f\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.6 b\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.6 g\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 f\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 i\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 m\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 c\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 beta2\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 beta1\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 j\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 a\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 l\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 e\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 h\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 g\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 beta3\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 b\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.7 k\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.8 a\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.8 i\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.8 c\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.8 b\r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>\r\nOpenSSL Project OpenSSL 0.9.8 \r\nOpenSSL Project openssl-0.9.8j.tar.gz\r\n<a href=http://www.openssl.org/source/openssl-0.9.8j.tar.gz target=_blank rel=external nofollow>http://www.openssl.org/source/openssl-0.9.8j.tar.gz</a>", "published": "2009-01-08T00:00:00", "type": "seebug", "title": "OpenSSL 'EVP_VerifyFinal'\u51fd\u6570\u7b7e\u540d\u9a8c\u8bc1\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-5077"], "modified": "2009-01-08T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-4636", "id": "SSV:4636", "sourceData": "", "sourceHref": "", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}], "suse": [{"lastseen": "2016-09-04T12:23:22", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5077"], "description": "The OpenSSL certificate checking routines EVP_VerifyFinal can return negative values and 0 on failure. In some places negative values were not checked and considered successful verification. Prior to this update it was possible to bypass the certification chain checks of openssl.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2009-01-23T16:31:52", "published": "2009-01-23T16:31:52", "id": "SUSE-SA:2009:006", "href": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00008.html", "type": "suse", "title": "SSL certificate checking bypass in openssl", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}]}