CVE-2013-0166
08.02.2013, 19:55
OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.Enginsight
Vendor | Product | Version |
---|---|---|
openssl | openssl | 0.9.1c:c |
openssl | openssl | 0.9.2b:b |
openssl | openssl | 0.9.3 |
openssl | openssl | 0.9.3a:a |
openssl | openssl | 0.9.4 |
openssl | openssl | 0.9.5 |
openssl | openssl | 0.9.5:beta1 |
openssl | openssl | 0.9.5:beta2 |
openssl | openssl | 0.9.5a:a |
openssl | openssl | 0.9.5a:a |
openssl | openssl | 0.9.5a:a |
openssl | openssl | 0.9.6 |
openssl | openssl | 0.9.6:beta1 |
openssl | openssl | 0.9.6:beta2 |
openssl | openssl | 0.9.6:beta3 |
openssl | openssl | 0.9.6a:a |
openssl | openssl | 0.9.6a:a |
openssl | openssl | 0.9.6a:a |
openssl | openssl | 0.9.6a:a |
openssl | openssl | 0.9.6b:b |
openssl | openssl | 0.9.6c:c |
openssl | openssl | 0.9.6d:d |
openssl | openssl | 0.9.6e:e |
openssl | openssl | 0.9.6f:f |
openssl | openssl | 0.9.6g:g |
openssl | openssl | 0.9.6h:h |
openssl | openssl | 0.9.6i:i |
openssl | openssl | 0.9.6j:j |
openssl | openssl | 0.9.6k:k |
openssl | openssl | 0.9.6l:l |
openssl | openssl | 0.9.6m:m |
openssl | openssl | 0.9.7 |
openssl | openssl | 0.9.7:beta1 |
openssl | openssl | 0.9.7:beta2 |
openssl | openssl | 0.9.7:beta3 |
openssl | openssl | 0.9.7:beta4 |
openssl | openssl | 0.9.7:beta5 |
openssl | openssl | 0.9.7:beta6 |
openssl | openssl | 0.9.7a:a |
openssl | openssl | 0.9.7b:b |
openssl | openssl | 0.9.7c:c |
openssl | openssl | 0.9.7d:d |
openssl | openssl | 0.9.7e:e |
openssl | openssl | 0.9.7f:f |
openssl | openssl | 0.9.7g:g |
openssl | openssl | 0.9.7h:h |
openssl | openssl | 0.9.7i:i |
openssl | openssl | 0.9.7j:j |
openssl | openssl | 0.9.7k:k |
openssl | openssl | 0.9.7l:l |
openssl | openssl | 0.9.7m:m |
openssl | openssl | 0.9.8 |
openssl | openssl | 0.9.8a:a |
openssl | openssl | 0.9.8b:b |
openssl | openssl | 0.9.8c:c |
openssl | openssl | 0.9.8d:d |
openssl | openssl | 0.9.8e:e |
openssl | openssl | 0.9.8f:f |
openssl | openssl | 0.9.8g:g |
openssl | openssl | 0.9.8h:h |
openssl | openssl | 0.9.8i:i |
openssl | openssl | 0.9.8j:j |
openssl | openssl | 0.9.8k:k |
openssl | openssl | 0.9.8l:l |
openssl | openssl | 0.9.8m:m |
openssl | openssl | 0.9.8m:m |
openssl | openssl | 0.9.8n:n |
openssl | openssl | 0.9.8o:o |
openssl | openssl | 0.9.8p:p |
openssl | openssl | 0.9.8q:q |
openssl | openssl | 0.9.8r:r |
openssl | openssl | 0.9.8s:s |
openssl | openssl | 0.9.8t:t |
openssl | openssl | 0.9.8u:u |
openssl | openssl | 0.9.8v:v |
openssl | openssl | 0.9.8w:w |
openssl | openssl | 0.9.8x:x |
openssl | openssl | 1.0.0 |
openssl | openssl | 1.0.0a:a |
openssl | openssl | 1.0.0b:b |
openssl | openssl | 1.0.0c:c |
openssl | openssl | 1.0.0d:d |
openssl | openssl | 1.0.0e:e |
openssl | openssl | 1.0.0f:f |
openssl | openssl | 1.0.0g:g |
openssl | openssl | 1.0.0h:h |
openssl | openssl | 1.0.0i:i |
openssl | openssl | 1.0.0j:j |
openssl | openssl | 1.0.1 |
openssl | openssl | 1.0.1a:a |
openssl | openssl | 1.0.1b:b |
openssl | openssl | 1.0.1c:c |
redhat | openssl | 0.9.6-15 |
redhat | openssl | 0.9.6b-3:b |
redhat | openssl | 0.9.7a-2:a |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
openssl |
| ||||||||||||||||
openssl098 |
|
Common Weakness Enumeration
References
http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=62e4506a7d4cec1c8e1ff687f6b220f6a62a57c7
http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=66e8211c0b1347970096e04b18aa52567c325200
http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=ebc71865f0506a293242bd4aec97cdc7a8ef24b0
http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=62e4506a7d4cec1c8e1ff687f6b220f6a62a57c7
http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=66e8211c0b1347970096e04b18aa52567c325200