ID: CVE-2003-0544

Last Modified: May 3, 2018

OpenSSL 0.9.6 and 0.9.7 does not properly track the number of characters in certain ASN.1 inputs, which allows remote attackers to cause a denial of service (crash) via an SSL client certificate that causes OpenSSL to read past the end of a buffer when the long form is used.

Access Vector: Network

Access Complexity: Low

Authentication: None

Confidentiality Impact: None

Integrity Impact: None

Availability Impact: Partial

Base Score: 5.0

Exploitability Score: 10.0

Impact Score: 2.9

CVSS V2: AV:N/AC:L/Au:N/C:N/I:N/A:P

Specialize CVSS-Score

NVD-CWE-Other

Condition Configuration
OR
OR
Alle Schwachstellen für openssl
Alle Schwachstellen für openssl
                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*"/>
    </set>
    <prop key="program_influence" value="input"/>
    <prop key="range" value="remote"/>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*"/>
    </set>
    <set operator="or">
        <prop key="program_influence" value="input"/>
        <prop key="program_influence" value="existence"/>
    </set>
    <prop key="range" value="remote"/>
</set>