fkie_cve-2005-2969
Vulnerability from fkie_nvd
Published
2005-10-18 21:02
Modified
2025-04-03 01:03
Severity ?
Summary
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
References
secalert@redhat.comftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf
secalert@redhat.comhttp://docs.info.apple.com/article.html?artnum=302847
secalert@redhat.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
secalert@redhat.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
secalert@redhat.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
secalert@redhat.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
secalert@redhat.comhttp://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
secalert@redhat.comhttp://secunia.com/advisories/17146
secalert@redhat.comhttp://secunia.com/advisories/17151
secalert@redhat.comhttp://secunia.com/advisories/17153
secalert@redhat.comhttp://secunia.com/advisories/17169
secalert@redhat.comhttp://secunia.com/advisories/17178
secalert@redhat.comhttp://secunia.com/advisories/17180
secalert@redhat.comhttp://secunia.com/advisories/17189
secalert@redhat.comhttp://secunia.com/advisories/17191
secalert@redhat.comhttp://secunia.com/advisories/17210
secalert@redhat.comhttp://secunia.com/advisories/17259
secalert@redhat.comhttp://secunia.com/advisories/17288
secalert@redhat.comhttp://secunia.com/advisories/17335
secalert@redhat.comhttp://secunia.com/advisories/17344
secalert@redhat.comhttp://secunia.com/advisories/17389
secalert@redhat.comhttp://secunia.com/advisories/17409
secalert@redhat.comhttp://secunia.com/advisories/17432
secalert@redhat.comhttp://secunia.com/advisories/17466
secalert@redhat.comhttp://secunia.com/advisories/17589
secalert@redhat.comhttp://secunia.com/advisories/17617
secalert@redhat.comhttp://secunia.com/advisories/17632
secalert@redhat.comhttp://secunia.com/advisories/17813
secalert@redhat.comhttp://secunia.com/advisories/17888
secalert@redhat.comhttp://secunia.com/advisories/18045
secalert@redhat.comhttp://secunia.com/advisories/18123
secalert@redhat.comhttp://secunia.com/advisories/18165
secalert@redhat.comhttp://secunia.com/advisories/18663
secalert@redhat.comhttp://secunia.com/advisories/19185
secalert@redhat.comhttp://secunia.com/advisories/21827
secalert@redhat.comhttp://secunia.com/advisories/23280
secalert@redhat.comhttp://secunia.com/advisories/23340
secalert@redhat.comhttp://secunia.com/advisories/23843
secalert@redhat.comhttp://secunia.com/advisories/23915
secalert@redhat.comhttp://secunia.com/advisories/25973
secalert@redhat.comhttp://secunia.com/advisories/26893
secalert@redhat.comhttp://secunia.com/advisories/31492
secalert@redhat.comhttp://securitytracker.com/id?1015032
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2006-031.htm
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
secalert@redhat.comhttp://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754
secalert@redhat.comhttp://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-875
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-881
secalert@redhat.comhttp://www.debian.org/security/2005/dsa-882
secalert@redhat.comhttp://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html
secalert@redhat.comhttp://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html
secalert@redhat.comhttp://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2005:179
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2005_61_openssl.html
secalert@redhat.comhttp://www.openssl.org/news/secadv_20051011.txtPatch, Vendor Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-762.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-800.htmlVendor Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0629.html
secalert@redhat.comhttp://www.securityfocus.com/bid/15071
secalert@redhat.comhttp://www.securityfocus.com/bid/15647
secalert@redhat.comhttp://www.securityfocus.com/bid/24799
secalert@redhat.comhttp://www.vupen.com/english/advisories/2005/2036
secalert@redhat.comhttp://www.vupen.com/english/advisories/2005/2659
secalert@redhat.comhttp://www.vupen.com/english/advisories/2005/2710
secalert@redhat.comhttp://www.vupen.com/english/advisories/2005/2908
secalert@redhat.comhttp://www.vupen.com/english/advisories/2005/3002
secalert@redhat.comhttp://www.vupen.com/english/advisories/2005/3056
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/3531
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/0326
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/0343
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2457
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/35287
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-1633
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=302847
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
af854a3a-2127-422b-91ae-364da2661108http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17146
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17151
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17153
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17169
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17178
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17180
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17189
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17191
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17210
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17259
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17288
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17335
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17344
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17389
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17409
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17432
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17466
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17589
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17617
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17632
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17813
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17888
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18045
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18123
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18165
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18663
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19185
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21827
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23280
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23340
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23843
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23915
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25973
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26893
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31492
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015032
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-875
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-881
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-882
af854a3a-2127-422b-91ae-364da2661108http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html
af854a3a-2127-422b-91ae-364da2661108http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html
af854a3a-2127-422b-91ae-364da2661108http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:179
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_61_openssl.html
af854a3a-2127-422b-91ae-364da2661108http://www.openssl.org/news/secadv_20051011.txtPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-762.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-800.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0629.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15071
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15647
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24799
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2036
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2659
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2710
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2908
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/3002
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/3056
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3531
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0326
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0343
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2457
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35287
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1633
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454
Impacted products
Vendor Product Version
openssl openssl 0.9.7
openssl openssl 0.9.7a
openssl openssl 0.9.7b
openssl openssl 0.9.7c
openssl openssl 0.9.7d
openssl openssl 0.9.7e
openssl openssl 0.9.7f
openssl openssl 0.9.7g
openssl openssl 0.9.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A518E8-21BE-4C5C-B425-410AB1208E9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E79A05-64F3-4397-952C-A5BB950C967D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*",
              "matchCriteriaId": "549BB01D-F322-4FE3-BDA2-4FEA8ED8568A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DE6CBD6-D6DD-4BC5-93F6-FDEA70163336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*",
              "matchCriteriaId": "98693865-2E79-4BD6-9F89-1994BC9A3E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6476506-EC37-4726-82DC-D0E8254A8CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D6ECEF7-CB16-4604-894B-6EB19F1CEF55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A4E446D-B9D3-45F2-9722-B41FA14A6C31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack."
    }
  ],
  "id": "CVE-2005-2969",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-10-18T21:02:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://docs.info.apple.com/article.html?artnum=302847"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17146"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17151"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17153"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17169"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17178"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17180"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17189"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17191"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17210"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17259"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17288"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17335"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17344"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17389"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17409"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17432"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17466"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17589"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17617"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17632"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17813"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/17888"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/18045"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/18123"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/18165"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/18663"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/19185"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/21827"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/23280"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/23340"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/23843"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/23915"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/25973"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26893"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31492"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1015032"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2005/dsa-875"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2005/dsa-881"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2005/dsa-882"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:179"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.novell.com/linux/security/advisories/2005_61_openssl.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.openssl.org/news/secadv_20051011.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-762.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-800.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/15071"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/15647"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/24799"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2005/2036"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2005/2659"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2005/2710"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2005/2908"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2005/3002"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2005/3056"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2006/3531"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/0326"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/0343"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/2457"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35287"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-1633"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=302847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17146"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17178"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17180"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17189"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17259"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17288"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17335"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17344"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17432"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17466"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17589"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17617"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17632"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18045"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18165"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21827"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23280"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23340"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23843"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23915"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25973"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26893"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31492"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-881"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_61_openssl.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.openssl.org/news/secadv_20051011.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-762.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-800.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15647"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24799"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2036"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2710"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/3002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/3056"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3531"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0343"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35287"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1633"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
      "lastModified": "2007-03-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…