ID CVE-2013-0166
Summary OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
References
Vulnerable Configurations
  • cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:openssl:0.9.6-15:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:openssl:0.9.6-15:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:openssl:0.9.6b-3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:openssl:0.9.6b-3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:openssl:0.9.7a-2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:openssl:0.9.7a-2:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 09-08-2018 - 01:29)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
assigner via4 cve@mitre.org
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
non_vulnerable_configuration via4
    oval via4
    • accepted 2014-03-24T04:00:41.262-04:00
      class vulnerability
      contributors
      • name Ganesh Manal
        organization Hewlett-Packard
      • name Sushant Kumar Singh
        organization Hewlett-Packard
      description OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
      family unix
      id oval:org.mitre.oval:def:18754
      status accepted
      submitted 2013-11-22T11:43:28.000-05:00
      title HP-UX Apache Web Server, Remote Denial of Service (DoS)
      version 38
    • accepted 2015-05-04T04:00:14.599-04:00
      class vulnerability
      contributors
      • name Sergey Artykhov
        organization ALTX-SOFT
      • name Maria Mikhno
        organization ALTX-SOFT
      definition_extensions
      comment VisualSVN Server is installed
      oval oval:org.mitre.oval:def:18636
      description OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
      family windows
      id oval:org.mitre.oval:def:19081
      status accepted
      submitted 2013-10-02T13:00:00
      title OpenSSL vulnerability before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d in VisualSVN Server (CVE-2013-0166)
      version 9
    • accepted 2014-01-20T04:00:20.018-05:00
      class vulnerability
      contributors
      • name Chandan M C
        organization Hewlett-Packard
      • name Chandan M C
        organization Hewlett-Packard
      definition_extensions
      • comment IBM AIX 5.3 is installed
        oval oval:org.mitre.oval:def:5325
      • comment IBM AIX 6.1 is installed
        oval oval:org.mitre.oval:def:5267
      • comment IBM AIX 7.1 is installed
        oval oval:org.mitre.oval:def:18828
      • comment IBM AIX 5.3 is installed
        oval oval:org.mitre.oval:def:5325
      • comment IBM AIX 6.1 is installed
        oval oval:org.mitre.oval:def:5267
      • comment IBM AIX 7.1 is installed
        oval oval:org.mitre.oval:def:18828
      description OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
      family unix
      id oval:org.mitre.oval:def:19360
      status accepted
      submitted 2013-11-18T10:06:56.357-05:00
      title Multiple OpenSSL vulnerabilities
      version 48
    • accepted 2015-04-20T04:01:22.549-04:00
      class vulnerability
      contributors
      • name Ganesh Manal
        organization Hewlett-Packard
      • name Sushant Kumar Singh
        organization Hewlett-Packard
      • name Sushant Kumar Singh
        organization Hewlett-Packard
      • name Prashant Kumar
        organization Hewlett-Packard
      • name Mike Cokus
        organization The MITRE Corporation
      description OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
      family unix
      id oval:org.mitre.oval:def:19487
      status accepted
      submitted 2013-11-22T11:43:28.000-05:00
      title HP-UX Running OpenSSL, Remote Denial of Service (DoS) and Unauthorized Disclosure
      version 45
    redhat via4
    advisories
    • rhsa
      id RHSA-2013:0587
    • rhsa
      id RHSA-2013:0782
    • rhsa
      id RHSA-2013:0783
    • rhsa
      id RHSA-2013:0833
    rpms
    • openssl-0:0.9.8e-26.el5_9.1
    • openssl-devel-0:0.9.8e-26.el5_9.1
    • openssl-perl-0:0.9.8e-26.el5_9.1
    • openssl-0:1.0.0-27.el6_4.2
    • openssl-devel-0:1.0.0-27.el6_4.2
    • openssl-perl-0:1.0.0-27.el6_4.2
    • openssl-static-0:1.0.0-27.el6_4.2
    refmap via4
    apple APPLE-SA-2013-09-12-1
    cert-vn VU#737740
    confirm
    debian DSA-2621
    hp
    • HPSBOV02852
    • HPSBUX02856
    • HPSBUX02909
    • SSRT101104
    • SSRT101108
    • SSRT101289
    secunia
    • 53623
    • 55108
    • 55139
    suse
    • SUSE-SU-2015:0578
    • openSUSE-SU-2016:0640
    vulnerable_product via4
    • cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:openssl:0.9.6-15:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:openssl:0.9.6b-3:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:openssl:0.9.7a-2:*:*:*:*:*:*:*
    Last major update 09-08-2018 - 01:29
    Published 08-02-2013 - 19:55
    Back to Top