CVE-2013-0166

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
opensslopenssl
0.9.1c:c
opensslopenssl
0.9.2b:b
opensslopenssl
0.9.3
opensslopenssl
0.9.3a:a
opensslopenssl
0.9.4
opensslopenssl
0.9.5
opensslopenssl
0.9.5:beta1
opensslopenssl
0.9.5:beta2
opensslopenssl
0.9.5a:a
opensslopenssl
0.9.5a:a
opensslopenssl
0.9.5a:a
opensslopenssl
0.9.6
opensslopenssl
0.9.6:beta1
opensslopenssl
0.9.6:beta2
opensslopenssl
0.9.6:beta3
opensslopenssl
0.9.6a:a
opensslopenssl
0.9.6a:a
opensslopenssl
0.9.6a:a
opensslopenssl
0.9.6a:a
opensslopenssl
0.9.6b:b
opensslopenssl
0.9.6c:c
opensslopenssl
0.9.6d:d
opensslopenssl
0.9.6e:e
opensslopenssl
0.9.6f:f
opensslopenssl
0.9.6g:g
opensslopenssl
0.9.6h:h
opensslopenssl
0.9.6i:i
opensslopenssl
0.9.6j:j
opensslopenssl
0.9.6k:k
opensslopenssl
0.9.6l:l
opensslopenssl
0.9.6m:m
opensslopenssl
0.9.7
opensslopenssl
0.9.7:beta1
opensslopenssl
0.9.7:beta2
opensslopenssl
0.9.7:beta3
opensslopenssl
0.9.7:beta4
opensslopenssl
0.9.7:beta5
opensslopenssl
0.9.7:beta6
opensslopenssl
0.9.7a:a
opensslopenssl
0.9.7b:b
opensslopenssl
0.9.7c:c
opensslopenssl
0.9.7d:d
opensslopenssl
0.9.7e:e
opensslopenssl
0.9.7f:f
opensslopenssl
0.9.7g:g
opensslopenssl
0.9.7h:h
opensslopenssl
0.9.7i:i
opensslopenssl
0.9.7j:j
opensslopenssl
0.9.7k:k
opensslopenssl
0.9.7l:l
opensslopenssl
0.9.7m:m
opensslopenssl
0.9.8
opensslopenssl
0.9.8a:a
opensslopenssl
0.9.8b:b
opensslopenssl
0.9.8c:c
opensslopenssl
0.9.8d:d
opensslopenssl
0.9.8e:e
opensslopenssl
0.9.8f:f
opensslopenssl
0.9.8g:g
opensslopenssl
0.9.8h:h
opensslopenssl
0.9.8i:i
opensslopenssl
0.9.8j:j
opensslopenssl
0.9.8k:k
opensslopenssl
0.9.8l:l
opensslopenssl
0.9.8m:m
opensslopenssl
0.9.8m:m
opensslopenssl
0.9.8n:n
opensslopenssl
0.9.8o:o
opensslopenssl
0.9.8p:p
opensslopenssl
0.9.8q:q
opensslopenssl
0.9.8r:r
opensslopenssl
0.9.8s:s
opensslopenssl
0.9.8t:t
opensslopenssl
0.9.8u:u
opensslopenssl
0.9.8v:v
opensslopenssl
0.9.8w:w
opensslopenssl
0.9.8x:x
opensslopenssl
1.0.0
opensslopenssl
1.0.0a:a
opensslopenssl
1.0.0b:b
opensslopenssl
1.0.0c:c
opensslopenssl
1.0.0d:d
opensslopenssl
1.0.0e:e
opensslopenssl
1.0.0f:f
opensslopenssl
1.0.0g:g
opensslopenssl
1.0.0h:h
opensslopenssl
1.0.0i:i
opensslopenssl
1.0.0j:j
opensslopenssl
1.0.1
opensslopenssl
1.0.1a:a
opensslopenssl
1.0.1b:b
opensslopenssl
1.0.1c:c
redhatopenssl
0.9.6-15
redhatopenssl
0.9.6b-3:b
redhatopenssl
0.9.7a-2:a
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
trusty
Fixed 1.0.1c-4ubuntu4
released
saucy
Fixed 1.0.1c-4ubuntu4
released
raring
Fixed 1.0.1c-4ubuntu4
released
quantal
Fixed 1.0.1c-3ubuntu2.1
released
precise
Fixed 1.0.1-4ubuntu5.6
released
oneiric
Fixed 1.0.0e-2ubuntu4.7
released
lucid
Fixed 0.9.8k-7ubuntu8.14
released
hardy
Fixed 0.9.8g-4ubuntu3.20
released
openssl098
trusty
Fixed 0.9.8o-7ubuntu3.2.14.04.1
released
saucy
Fixed 0.9.8o-7ubuntu3.2.13.10.1
released
raring
ignored
quantal
ignored
precise
Fixed 0.9.8o-7ubuntu3.2
released
oneiric
ignored
lucid
dne
hardy
dne
Common Weakness Enumeration
References