Last Modified: May 3, 2018
Integer overflow in OpenSSL 0.9.6 and 0.9.7 allows remote attackers to cause a denial of service (crash) via an SSL client certificate with certain ASN.1 tag values.
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Partial
Base Score: 5.0
Exploitability Score: 10.0
Impact Score: 2.9
CVSS V2: AV:N/AC:L/Au:N/C:N/I:N/A:P
NVD-CWE-Other
['alert tcp $EXTERNAL_NET any -> $HOME_NET [443,8443] ( msg:"SERVER-OTHER Novell iManager ASN.1 client hello parsing denial of service attempt "; flow:to_server,established; content:"|16 03 00 00 55 01 00 00 51 03 00 FF FF FF FF 11 22 33 44 11 22 33 44 11 22 33 44 11 22 33 44 11 22 33|"; metadata:policy max-detect-ips drop; service:ssl; reference:cve,2003-0543; classtype:denial-of-service; sid:51027; rev:1; )\n']
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:* Part: a Vendor: openssl | Alle Schwachstellen für openssl | |
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:* Part: a Vendor: openssl | Alle Schwachstellen für openssl |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="remote"/> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*"/> </set> <set operator="or"> <prop key="program_influence" value="input"/> <prop key="program_influence" value="existence"/> </set> <prop key="range" value="remote"/> </set>