ID CVE-2009-0789
Summary OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
References
Vulnerable Configurations
  • OpenSSL Project OpenSSL 0.9.8j
    cpe:2.3:a:openssl:openssl:0.9.8j
  • OpenSSL Project OpenSSL 0.9.8i
    cpe:2.3:a:openssl:openssl:0.9.8i
  • OpenSSL Project OpenSSL 0.9.8h
    cpe:2.3:a:openssl:openssl:0.9.8h
  • OpenSSL Project OpenSSL 0.9.8g
    cpe:2.3:a:openssl:openssl:0.9.8g
  • OpenSSL Project OpenSSL 0.9.8f
    cpe:2.3:a:openssl:openssl:0.9.8f
  • OpenSSL Project OpenSSL 0.9.8e
    cpe:2.3:a:openssl:openssl:0.9.8e
  • OpenSSL Project OpenSSL 0.9.8d
    cpe:2.3:a:openssl:openssl:0.9.8d
  • OpenSSL Project OpenSSL 0.9.8c
    cpe:2.3:a:openssl:openssl:0.9.8c
  • OpenSSL Project OpenSSL 0.9.8b
    cpe:2.3:a:openssl:openssl:0.9.8b
  • OpenSSL Project OpenSSL 0.9.8a
    cpe:2.3:a:openssl:openssl:0.9.8a
  • OpenSSL Project OpenSSL 0.9.8
    cpe:2.3:a:openssl:openssl:0.9.8
  • OpenSSL Project OpenSSL 0.9.7l
    cpe:2.3:a:openssl:openssl:0.9.7l
  • OpenSSL Project OpenSSL 0.9.7m
    cpe:2.3:a:openssl:openssl:0.9.7m
  • OpenSSL Project OpenSSL 0.9.7k
    cpe:2.3:a:openssl:openssl:0.9.7k
  • OpenSSL Project OpenSSL 0.9.7j
    cpe:2.3:a:openssl:openssl:0.9.7j
  • OpenSSL Project OpenSSL 0.9.7i
    cpe:2.3:a:openssl:openssl:0.9.7i
  • OpenSSL Project OpenSSL 0.9.7h
    cpe:2.3:a:openssl:openssl:0.9.7h
  • OpenSSL Project OpenSSL 0.9.7g
    cpe:2.3:a:openssl:openssl:0.9.7g
  • OpenSSL Project OpenSSL 0.9.7f
    cpe:2.3:a:openssl:openssl:0.9.7f
  • OpenSSL Project OpenSSL 0.9.7e
    cpe:2.3:a:openssl:openssl:0.9.7e
  • OpenSSL Project OpenSSL 0.9.7d
    cpe:2.3:a:openssl:openssl:0.9.7d
  • OpenSSL Project OpenSSL 0.9.7c
    cpe:2.3:a:openssl:openssl:0.9.7c
  • OpenSSL Project OpenSSL 0.9.7b
    cpe:2.3:a:openssl:openssl:0.9.7b
  • OpenSSL Project OpenSSL 0.9.7a
    cpe:2.3:a:openssl:openssl:0.9.7a
  • OpenSSL Project OpenSSL 0.9.7 Beta6
    cpe:2.3:a:openssl:openssl:0.9.7:beta6
  • OpenSSL Project OpenSSL 0.9.7 Beta5
    cpe:2.3:a:openssl:openssl:0.9.7:beta5
  • OpenSSL Project OpenSSL 0.9.7 Beta4
    cpe:2.3:a:openssl:openssl:0.9.7:beta4
  • OpenSSL Project OpenSSL 0.9.7 beta3
    cpe:2.3:a:openssl:openssl:0.9.7:beta3
  • OpenSSL Project OpenSSL 0.9.7 beta2
    cpe:2.3:a:openssl:openssl:0.9.7:beta2
  • OpenSSL Project OpenSSL 0.9.7 beta1
    cpe:2.3:a:openssl:openssl:0.9.7:beta1
  • OpenSSL Project OpenSSL 0.9.7
    cpe:2.3:a:openssl:openssl:0.9.7
  • OpenSSL Project OpenSSL 0.9.6g
    cpe:2.3:a:openssl:openssl:0.9.6g
  • OpenSSL Project OpenSSL 0.9.6f
    cpe:2.3:a:openssl:openssl:0.9.6f
  • OpenSSL Project OpenSSL 0.9.6i
    cpe:2.3:a:openssl:openssl:0.9.6i
  • OpenSSL Project OpenSSL 0.9.6h
    cpe:2.3:a:openssl:openssl:0.9.6h
  • OpenSSL Project OpenSSL 0.9.6e
    cpe:2.3:a:openssl:openssl:0.9.6e
  • OpenSSL Project OpenSSL 0.9.6d
    cpe:2.3:a:openssl:openssl:0.9.6d
  • OpenSSL Project OpenSSL 0.9.6k
    cpe:2.3:a:openssl:openssl:0.9.6k
  • OpenSSL Project OpenSSL 0.9.6j
    cpe:2.3:a:openssl:openssl:0.9.6j
  • OpenSSL Project OpenSSL 0.9.6l
    cpe:2.3:a:openssl:openssl:0.9.6l
  • OpenSSL Project OpenSSL 0.9.6m
    cpe:2.3:a:openssl:openssl:0.9.6m
  • OpenSSL Project OpenSSL 0.9.6c
    cpe:2.3:a:openssl:openssl:0.9.6c
  • OpenSSL Project OpenSSL 0.9.6b
    cpe:2.3:a:openssl:openssl:0.9.6b
  • OpenSSL Project OpenSSL 0.9.6a
    cpe:2.3:a:openssl:openssl:0.9.6a
  • OpenSSL Project OpenSSL 0.9.6a Beta1
    cpe:2.3:a:openssl:openssl:0.9.6a:beta1
  • OpenSSL Project OpenSSL 0.9.6a Beta2
    cpe:2.3:a:openssl:openssl:0.9.6a:beta2
  • OpenSSL Project OpenSSL 0.9.6a Beta3
    cpe:2.3:a:openssl:openssl:0.9.6a:beta3
  • OpenSSL Project OpenSSL 0.9.6
    cpe:2.3:a:openssl:openssl:0.9.6
  • OpenSSL Project OpenSSL 0.9.6 Beta1
    cpe:2.3:a:openssl:openssl:0.9.6:beta1
  • OpenSSL Project OpenSSL 0.9.6 Beta2
    cpe:2.3:a:openssl:openssl:0.9.6:beta2
  • OpenSSL Project OpenSSL 0.9.6 Beta3
    cpe:2.3:a:openssl:openssl:0.9.6:beta3
  • OpenSSL Project OpenSSL 0.9.5 Beta2
    cpe:2.3:a:openssl:openssl:0.9.5:beta2
  • OpenSSL Project OpenSSL 0.9.5a
    cpe:2.3:a:openssl:openssl:0.9.5a
  • OpenSSL Project OpenSSL 0.9.5a Beta1
    cpe:2.3:a:openssl:openssl:0.9.5a:beta1
  • OpenSSL Project OpenSSL 0.9.5a Beta2
    cpe:2.3:a:openssl:openssl:0.9.5a:beta2
  • OpenSSL Project OpenSSL 0.9.5
    cpe:2.3:a:openssl:openssl:0.9.5
  • OpenSSL Project OpenSSL 0.9.5 Beta1
    cpe:2.3:a:openssl:openssl:0.9.5:beta1
  • OpenSSL Project OpenSSL 0.9.4
    cpe:2.3:a:openssl:openssl:0.9.4
  • OpenSSL Project OpenSSL 0.9.3
    cpe:2.3:a:openssl:openssl:0.9.3
  • OpenSSL Project OpenSSL 0.9.3a
    cpe:2.3:a:openssl:openssl:0.9.3a
  • OpenSSL Project OpenSSL 0.9.2b
    cpe:2.3:a:openssl:openssl:0.9.2b
  • OpenSSL Project OpenSSL 0.9.1c
    cpe:2.3:a:openssl:openssl:0.9.1c
CVSS
Base: 5.0 (as of 30-03-2009 - 09:13)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2009-005.NASL
    description The remote host is running a version of Mac OS X 10.5 or 10.4 that does not have Security Update 2009-005 applied. This security update contains fixes for the following products : - Alias Manager - CarbonCore - ClamAV - ColorSync - CoreGraphics - CUPS - Flash Player plug-in - ImageIO - Launch Services - MySQL - PHP - SMB - Wiki Server
    last seen 2019-01-16
    modified 2018-07-14
    plugin id 40945
    published 2009-09-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40945
    title Mac OS X Multiple Vulnerabilities (Security Update 2009-005)
  • NASL family Web Servers
    NASL id OPENSSL_0_9_8L.NASL
    description According to its banner, the remote server is running a version of OpenSSL that is earlier than 0.9.8l. As such, it may be affected by multiple vulnerabilities : - A remote attacker could crash the server by sending malformed ASN.1 data. This flaw only affects some architectures, Win64 and other unspecified platforms. (CVE-2009-0789) - A remote attacker could saturate the server by sending a big number of 'future epoch' DTLS records. (CVE-2009-1377) - A remote attacker could saturate the server by sending duplicate DTLS records, or DTLS records with too big sequence numbers. (CVE-2009-1378) - A remote attacker could spoof certificates by computing MD2 hash collisions. (CVE-2009-2409)
    last seen 2019-01-16
    modified 2018-11-15
    plugin id 17765
    published 2012-01-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17765
    title OpenSSL < 0.9.8l Multiple Vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_COMPAT-OPENSSL097G-110721.NASL
    description This update adds openssl patches since 2007 for : - CVE-2008-5077 - CVE-2009-0590 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180
    last seen 2018-11-13
    modified 2018-11-10
    plugin id 75453
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75453
    title openSUSE Security Update : compat-openssl097g (openSUSE-SU-2011:0845-1)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2009-098-01.NASL
    description New openssl packages are available for Slackware 11.0, 12.0, 12.1, 12.2, and -current to fix security issues.
    last seen 2019-01-16
    modified 2018-08-09
    plugin id 36104
    published 2009-04-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=36104
    title Slackware 11.0 / 12.0 / 12.1 / 12.2 / current : openssl (SSA:2009-098-01)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_COMPAT-OPENSSL097G-090416.NASL
    description This update of openssl fixes the following problems : - ASN1_STRING_print_ex() function allows remote denial of service. (CVE-2009-0590) - denial of service due to malformed ASN.1 structures. (CVE-2009-0789)
    last seen 2019-01-16
    modified 2016-12-21
    plugin id 41376
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41376
    title SuSE 11 Security Update : OpenSSL (SAT Patch Number 789)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_COMPAT-OPENSSL097G-110721.NASL
    description This update adds openssl patches since 2007 for : - CVE-2009-0590 - CVE-2008-5077 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180
    last seen 2018-09-01
    modified 2016-12-21
    plugin id 55711
    published 2011-07-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55711
    title SuSE 11.1 Security Update : compat-openssl097g (SAT Patch Number 4913)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_OPENSSL-6179.NASL
    description This update of openssl fixes the following problems : - ASN1_STRING_print_ex() function allows remote denial of service. (CVE-2009-0590) - denial of service due to malformed ASN.1 structures. (CVE-2009-0789)
    last seen 2019-01-16
    modified 2016-12-22
    plugin id 41571
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41571
    title SuSE 10 Security Update : OpenSSL (ZYPP Patch Number 6179)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_LIBOPENSSL-DEVEL-6173.NASL
    description This update of openssl fixes the following problems : - CVE-2009-0590: ASN1_STRING_print_ex() function allows remote denial of service - CVE-2009-0789: denial of service due to malformed ASN.1 structures
    last seen 2019-01-16
    modified 2016-12-22
    plugin id 38646
    published 2009-04-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=38646
    title openSUSE 10 Security Update : libopenssl-devel (libopenssl-devel-6173)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_0_COMPAT-OPENSSL097G-090416.NASL
    description This update of openssl fixes the following problems : - CVE-2009-0590: ASN1_STRING_print_ex() function allows remote denial of service - CVE-2009-0789: denial of service due to malformed ASN.1 structures
    last seen 2019-01-16
    modified 2016-12-21
    plugin id 39938
    published 2009-07-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=39938
    title openSUSE Security Update : compat-openssl097g (compat-openssl097g-788)
  • NASL family Web Servers
    NASL id OPENSSL_0_9_8K.NASL
    description According to its banner, the remote server is running a version of OpenSSL prior to 0.9.8k. It is, therefore, affected by multiple vulnerabilities : - A denial of service vulnerability exists in the ASN1_STRING_print_ex() function due to improper string handling. A remote attacker can exploit this to cause an invalid memory access and application crash. (CVE-2009-0590) - A flaw exists in the CMS_verify() function due to improper handling of errors associated with malformed signed attributes. A remote attacker can exploit this to repudiate a signature that originally appeared to be valid but was actually invalid. (CVE-2009-0591) - A denial of service vulnerability exists due to improper handling of malformed ASN.1 structures. A remote attacker can exploit this to cause an invalid memory access and application crash. (CVE-2009-0789) - A memory leak exists in the SSL_free() function in ssl_lib.c. A remote attacker can exploit this to exhaust memory resources, resulting in a denial of service condition. (CVE-2009-5146)
    last seen 2019-01-16
    modified 2018-07-16
    plugin id 17763
    published 2012-01-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17763
    title OpenSSL < 0.9.8k Multiple Vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_LIBOPENSSL-DEVEL-090415.NASL
    description This update of openssl fixes the following problems : - ASN1_STRING_print_ex() function allows remote denial of service. (CVE-2009-0590) - CMS_verify() function allows signatures to look valid. (CVE-2009-0591) - denial of service due to malformed ASN.1 structures. (CVE-2009-0789)
    last seen 2019-01-16
    modified 2016-12-21
    plugin id 41423
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41423
    title SuSE 11 Security Update : OpenSSL (SAT Patch Number 772)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_COMPAT-OPENSSL097G-110721.NASL
    description This update adds openssl patches since 2007 for : - CVE-2008-5077 - CVE-2009-0590 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180
    last seen 2018-11-13
    modified 2018-11-10
    plugin id 75802
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75802
    title openSUSE Security Update : compat-openssl097g (openSUSE-SU-2011:0845-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_COMPAT-OPENSSL097G-7644.NASL
    description This update adds openssl patches since 2007 for : - CVE-2009-0590 - CVE-2008-5077 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180
    last seen 2018-09-01
    modified 2016-12-22
    plugin id 55715
    published 2011-07-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55715
    title SuSE 10 Security Update : compat-openssl097g (ZYPP Patch Number 7644)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_0_LIBOPENSSL-DEVEL-090415.NASL
    description This update of openssl fixes the following problems : - CVE-2009-0590: ASN1_STRING_print_ex() function allows remote denial of service - CVE-2009-0789: denial of service due to malformed ASN.1 structures
    last seen 2019-01-16
    modified 2016-12-21
    plugin id 40033
    published 2009-07-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40033
    title openSUSE Security Update : libopenssl-devel (libopenssl-devel-785)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_1_LIBOPENSSL-DEVEL-090415.NASL
    description This update of openssl fixes the following problems : - CVE-2009-0590: ASN1_STRING_print_ex() function allows remote denial of service - CVE-2009-0591: CMS_verify() function allows signatures to look valid - CVE-2009-0789: denial of service due to malformed ASN.1 structures
    last seen 2019-01-16
    modified 2016-12-21
    plugin id 40260
    published 2009-07-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40260
    title openSUSE Security Update : libopenssl-devel (libopenssl-devel-786)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_COMPAT-OPENSSL097G-6170.NASL
    description This update of openssl fixes the following problems : - ASN1_STRING_print_ex() function allows remote denial of service. (CVE-2009-0590) - denial of service due to malformed ASN.1 structures. (CVE-2009-0789)
    last seen 2019-01-16
    modified 2016-12-22
    plugin id 41491
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41491
    title SuSE 10 Security Update : compat-openssl097g (ZYPP Patch Number 6170)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_COMPAT-OPENSSL097G-7645.NASL
    description This update adds openssl patches since 2007 for : - CVE-2009-0590 - CVE-2008-5077 - CVE-2009-0789 - CVE-2009-3555 - CVE-2010-4180
    last seen 2018-09-02
    modified 2016-12-22
    plugin id 57170
    published 2011-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57170
    title SuSE 10 Security Update : compat-openssl097g (ZYPP Patch Number 7645)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_1_COMPAT-OPENSSL097G-090416.NASL
    description This update of openssl fixes the following problems : - CVE-2009-0590: ASN1_STRING_print_ex() function allows remote denial of service - CVE-2009-0789: denial of service due to malformed ASN.1 structures
    last seen 2019-01-16
    modified 2016-12-21
    plugin id 40204
    published 2009-07-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40204
    title openSUSE Security Update : compat-openssl097g (compat-openssl097g-788)
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_12397.NASL
    description This update of OpenSSL fixes the following problems : - ASN1_STRING_print_ex() function allows remote denial of service. (CVE-2009-0590) - denial of service due to malformed ASN.1 structures. (CVE-2009-0789)
    last seen 2019-01-16
    modified 2016-12-21
    plugin id 41293
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41293
    title SuSE9 Security Update : OpenSSL (YOU Patch Number 12397)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_COMPAT-OPENSSL097G-6175.NASL
    description This update of openssl fixes the following problems : - CVE-2009-0590: ASN1_STRING_print_ex() function allows remote denial of service - CVE-2009-0789: denial of service due to malformed ASN.1 structures
    last seen 2019-01-16
    modified 2016-12-22
    plugin id 38643
    published 2009-04-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=38643
    title openSUSE 10 Security Update : compat-openssl097g (compat-openssl097g-6175)
refmap via4
apple APPLE-SA-2009-09-10-2
bid 34256
confirm
hp
  • HPSBOV02540
  • HPSBUX02435
  • SSRT090059
netbsd NetBSD-SA2009-008
osvdb 52866
sectrack 1021906
secunia
  • 34411
  • 34460
  • 34666
  • 35065
  • 35380
  • 35729
  • 36701
  • 42724
  • 42733
suse
  • SUSE-SR:2009:010
  • SUSE-SU-2011:0847
  • openSUSE-SU-2011:0845
vupen
  • ADV-2009-0850
  • ADV-2009-1020
  • ADV-2009-1175
  • ADV-2009-1548
xf openssl-asn1-structure-dos(49433)
statements via4
contributor Tomas Hoger
lastmodified 2009-03-30
organization Red Hat
statement Not vulnerable. This issue only affects a small number of operating systems and does not affect the openssl packages as shipped with Red Hat Enterprise Linux 2.1, 3, 4 or 5.
Last major update 22-08-2016 - 21:59
Published 27-03-2009 - 12:30
Last modified 16-08-2017 - 21:30
Back to Top