CVE-2010-0742

The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
opensslopenssl
𝑥
≤ 0.9.8n
opensslopenssl
0.9.1c:c
opensslopenssl
0.9.2b:b
opensslopenssl
0.9.3
opensslopenssl
0.9.3a:a
opensslopenssl
0.9.4
opensslopenssl
0.9.5
opensslopenssl
0.9.5:beta1
opensslopenssl
0.9.5:beta2
opensslopenssl
0.9.5a:a
opensslopenssl
0.9.5a:a
opensslopenssl
0.9.5a:a
opensslopenssl
0.9.6
opensslopenssl
0.9.6:beta1
opensslopenssl
0.9.6:beta2
opensslopenssl
0.9.6:beta3
opensslopenssl
0.9.6a:a
opensslopenssl
0.9.6a:a
opensslopenssl
0.9.6a:a
opensslopenssl
0.9.6a:a
opensslopenssl
0.9.6b:b
opensslopenssl
0.9.6c:c
opensslopenssl
0.9.6d:d
opensslopenssl
0.9.6e:e
opensslopenssl
0.9.6f:f
opensslopenssl
0.9.6g:g
opensslopenssl
0.9.6h:h
opensslopenssl
0.9.6i:i
opensslopenssl
0.9.6j:j
opensslopenssl
0.9.6k:k
opensslopenssl
0.9.6l:l
opensslopenssl
0.9.6m:m
opensslopenssl
0.9.7
opensslopenssl
0.9.7:beta1
opensslopenssl
0.9.7:beta2
opensslopenssl
0.9.7:beta3
opensslopenssl
0.9.7:beta4
opensslopenssl
0.9.7:beta5
opensslopenssl
0.9.7:beta6
opensslopenssl
0.9.7a:a
opensslopenssl
0.9.7b:b
opensslopenssl
0.9.7c:c
opensslopenssl
0.9.7d:d
opensslopenssl
0.9.7e:e
opensslopenssl
0.9.7f:f
opensslopenssl
0.9.7g:g
opensslopenssl
0.9.7h:h
opensslopenssl
0.9.7i:i
opensslopenssl
0.9.7j:j
opensslopenssl
0.9.7k:k
opensslopenssl
0.9.7l:l
opensslopenssl
0.9.7m:m
opensslopenssl
0.9.8
opensslopenssl
0.9.8a:a
opensslopenssl
0.9.8b:b
opensslopenssl
0.9.8c:c
opensslopenssl
0.9.8d:d
opensslopenssl
0.9.8e:e
opensslopenssl
0.9.8f:f
opensslopenssl
0.9.8g:g
opensslopenssl
0.9.8h:h
opensslopenssl
0.9.8i:i
opensslopenssl
0.9.8j:j
opensslopenssl
0.9.8k:k
opensslopenssl
0.9.8l:l
opensslopenssl
0.9.8m:m
opensslopenssl
1.0.0
opensslopenssl
1.0.0:beta1
opensslopenssl
1.0.0:beta2
opensslopenssl
1.0.0:beta3
opensslopenssl
1.0.0:beta4
opensslopenssl
1.0.0:beta5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
lenny
not-affected
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
lucid
not-affected
karmic
not-affected
jaunty
not-affected
hardy
not-affected
dapper
not-affected
Common Weakness Enumeration
References