OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recursion) via malformed ASN.1 sequences.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5528 | vdb entry signature |
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html | vendor advisory |
ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc | vendor advisory |
http://secunia.com/advisories/17381 | third party advisory |
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-003.txt.asc | vendor advisory |
http://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtml | vendor advisory |
http://www.securityfocus.com/bid/8970 | vdb entry patch vendor advisory |
http://marc.info/?l=bugtraq&m=106796246511667&w=2 | mailing list |
http://rhn.redhat.com/errata/RHSA-2004-119.html | vendor advisory |
http://www.openssl.org/news/secadv_20031104.txt | patch vendor advisory |
http://www.kb.cert.org/vuls/id/412478 | us government resource third party advisory patch |
http://marc.info/?l=bugtraq&m=108403850228012&w=2 | mailing list |