CVE-2004-0079

Scores

EPSS

0.023very_low2.3%
0%20%40%60%80%100%

Percentile: 2.3%

CVSS

7.5high3.x
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 3.x
7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Description

The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhat

CWEs

CWE-476

Exploits

Exploit ID: 146

Source: exploitdb

URL: https://www.exploit-db.com/exploits/146

Exploit ID: 22264

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22264

Exploit ID: 23199

Source: exploitdb

URL: https://www.exploit-db.com/exploits/23199

Exploit ID: 40347

Source: exploitdb

URL: https://www.exploit-db.com/exploits/40347

Recommendations

Source: nvd

All users are recommened to upgrade openssl to either 0.9.7d or 0.9.6m:

# emerge sync
# emerge -pv “>=dev-libs/openssl-0.9.7d”
# emerge “>=dev-libs/openssl-0.9.7d”

URL: http://security.gentoo.org/glsa/glsa-200403-03.xml

Vulnerable Software (71)

Type: Configuration

Product: openssl

Operating System: rhel 3

Trait:
{  "fixed": "0.9.7a-33.4"}

Source: redhat

Type: Configuration

Product: openssl

Operating System: debian

Trait:
{  "fixed": "0.9.7d-1"}

Source: debian

Type: Configuration

Product: openssl096

Operating System: debian

Trait:
{  "fixed": "0.9.6m-1"}

Source: debian

Type: Configuration

Product: openssl096b

Operating System: rhel 3

Trait:
{  "fixed": "0.9.6b-16"}

Source: redhat

Type: Configuration

Product: openssl096b

Operating System: rhel 3

Trait:
{  "fixed": "0.9.6b-16.42"}

Source: redhat

Type: Configuration

Product: openssl096b

Operating System: rhel 4

Trait:
{  "fixed": "0.9.6b-22.42"}

Source: redhat

Type: Configuration

Vendor: *

Product: aaa_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:h:cisco:firewall_services_module...

Source: nvd

Type: Configuration

Vendor: *

Product: access_registrar

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",          "vulnerable": true        },        {          "cpe23uri": ...

Source: nvd

Type: Configuration

Vendor: *

Product: apache-based_web_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:h:cisco:firewall_services_module...

Source: nvd

Type: Configuration

Vendor: *

Product: application_and_content_networking_software

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",          "vulnerable": true        },        {          "cpe23uri": ...

Source: nvd

Type: Configuration

Vendor: *

Product: bsafe_ssl-j

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",          "vulnerable": true        },        {          "cpe23uri": ...

Source: nvd

Type: Configuration

Vendor: *

Product: cacheos_ca_sa

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",          "vulnerable": true        },        {          "cpe23uri": ...

Source: nvd

Type: Configuration

Vendor: *

Product: call_manager

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",          "vulnerable": true        },        {          "cpe23uri": ...

Source: nvd

Type: Configuration

Vendor: *

Product: ciscoworks_common_management_foundation

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:cisco:ciscowo...

Source: nvd

Type: Configuration

Vendor: *

Product: ciscoworks_common_services

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:cisco:ciscowo...

Source: nvd

Type: Configuration

Vendor: *

Product: clientless_vpn_gateway_4400

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:h:cisco:firewall_services_module...

Source: nvd

Type: Configuration

Vendor: *

Product: content_services_switch_11500

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",          "vulnerable": true        },        {          "cpe23uri": ...

Source: nvd

Type: Configuration

Vendor: *

Product: converged_communications_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:cisco:ciscowo...

Source: nvd

Type: Configuration

Vendor: *

Product: crypto_accelerator_4000

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",          "vulnerable": true        },        {          "cpe23uri": ...

Source: nvd

Type: Configuration

Vendor: *

Product: css11000_content_services_switch

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",          "vulnerable": true        },        {          "cpe23uri": ...

Source: nvd