Vulnerability Name:

CVE-2003-0543 (CCN-13316)

Assigned:2003-09-30
Published:2003-09-30
Updated:2018-05-03
Summary:Integer overflow in OpenSSL 0.9.6 and 0.9.7 allows remote attackers to cause a denial of service (crash) via an SSL client certificate with certain ASN.1 tag values.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-03:18
OpenSSL vulnerabilities in ASN.1 parsing

Source: CCN
Type: SGI Security Advisory 20030904-01-P
Multiple OpenSSH/OpenSSL Vulnerabilities

Source: CCN
Type: SGI Security Advisory 20030904-02-P
Multiple OpenSSH/OpenSSL Vulnerabilities Update

Source: CCN
Type: SGI Security Advisory 20031002-01-U
SGI Advanced Linux Environment security update #3

Source: CCN
Type: BugTraq Mailing List, Fri Oct 31 2003 - 12:58:59 CST
VMware GSX Server and ESX Server OpenSSL vulnerability patches

Source: CONFIRM
Type: Vendor Advisory
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=104893

Source: MITRE
Type: CNA
CVE-2003-0543

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:751
openssl

Source: CCN
Type: AppleCare Knowledge Base Document 61798
Security Update 2003-08-14

Source: CCN
Type: Oracle Security Alert #62
SSL Update for CERT CA200326 and older SSL issues

Source: CCN
Type: RHSA-2003-291
Updated OpenSSL packages fix vulnerabilities

Source: CCN
Type: RHSA-2003-292
Updated OpenSSL packages fix vulnerabilities

Source: CCN
Type: RHSA-2003-293
openssl security update

Source: CCN
Type: SA22249
IBM Rational RequisitePro OpenSSL Vulnerability

Source: SECUNIA
Type: UNKNOWN
22249

Source: CCN
Type: Sun Alert ID: 57100
Sun Linux Multiple Security Vulnerabilities in OpenSSL

Source: CCN
Type: Sun Alert ID: 57444
Sun Grid Engine 5.3 Software May Experience Security Vulnerabilities in OpenSSL

Source: CCN
Type: Sun Alert ID: 57498
ASN.1 Parsing Issue May Lead to Denial-of-Service Condition in Sun Java System Web Server and Sun Java

Source: CCN
Type: Sun Alert ID: 57599
ASN1 Decoder For Sun Java System Directory Server May Be Subject to Denial of Service (DoS)

Source: CCN
Type: Sun Alert ID: 57475
SunPlex (Sun Cluster) Multiple Security Vulnerabilities in OpenSSL Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Protocols

Source: SUNALERT
Type: UNKNOWN
201029

Source: CCN
Type: Novell Technical Information Document TID10087450
Regarding NISCC vulnerability advisory on SSL (secure sockets layer) and TLS -

Source: CONFIRM
Type: UNKNOWN
http://www-1.ibm.com/support/docview.wss?uid=swg21247112

Source: CCN
Type: CERT Advisory CA-2003-26
Multiple Vulnerabilities in SSL/TLS Implementations

Source: CERT
Type: US Government Resource
CA-2003-26

Source: CCN
Type: CIAC Information Bulletin N-159
OpenSSL Security Vulnerabilities in ASN.1 parsing

Source: CCN
Type: CIAC Information Bulletin O-065
Security Vulnerabilities in ASN.1

Source: CCN
Type: cisco-sa-20030930-ssl
Cisco Security Advisory: SSL Implementation Vulnerabilities

Source: DEBIAN
Type: UNKNOWN
DSA-393

Source: DEBIAN
Type: UNKNOWN
DSA-394

Source: DEBIAN
Type: DSA-393
openssl -- denial of service

Source: DEBIAN
Type: DSA-394
openssl095 -- ASN.1 parsing vulnerability

Source: CCN
Type: Hitachi Security Vulnerability Information HS03-007
Multiple Vulnerabilities in SSL/TLS Implementations

Source: CCN
Type: US-CERT VU#104280
Multiple vulnerabilities in SSL/TLS implementations

Source: CCN
Type: US-CERT VU#255484
OpenSSL contains integer overflow handling ASN.1 tags (1)

Source: CERT-VN
Type: US Government Resource
VU#255484

Source: ENGARDE
Type: UNKNOWN
ESA-20030930-027

Source: CCN
Type: NetBSD Security Advisory 2004-003
OpenSSL 0.9.6 ASN.1 parser vulnerability

Source: CCN
Type: Guardian Digital Security Advisory ESA-20030930-027
openssl, openssl-misc

Source: CCN
Type: Immunix Secured OS Security Advisory IMNX-2003-7+-022-01
openssl

Source: CCN
Type: slackware-security Mailing List, Tue Sep 30 16:16:35 PDT 2003
OpenSSL security update (SSA:2003-273-01)

Source: CCN
Type: Gentoo Linux Security Announcement 200309-19
openssl

Source: CCN
Type: OpenPKG-SA-2003.044
OpenSSL

Source: CCN
Type: OpenSSL Security Advisory [30 September 2003]
Vulnerabilities in ASN.1 parsing

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2003:291

Source: REDHAT
Type: UNKNOWN
RHSA-2003:292

Source: BID
Type: UNKNOWN
8732

Source: CCN
Type: BID-8732
OpenSSL ASN.1 Parsing Vulnerabilities

Source: CCN
Type: TLSA-2003-55
DoS vulnerability in openssl

Source: CCN
Type: NISCC Vulnerability Advisory 006489/OpenSSL
Vulnerability Issues in OpenSSL

Source: MISC
Type: UNKNOWN
http://www.uniras.gov.uk/vuls/2003/006489/openssl.htm

Source: VUPEN
Type: UNKNOWN
ADV-2006-3900

Source: XF
Type: UNKNOWN
openssl-asn1-ssl-dos(13316)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:4254

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:5292

Source: SUSE
Type: SUSE-SA:2003:043
openssl: remote denial-of-service

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.2sx:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.2sy:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
  • AND
  • cpe:/o:sgi:irix:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.4:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firewall_services_module:*:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:database_server:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.7:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_community:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.5:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.6:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.8:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:sn_5420_storage_router:*:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.20:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.9:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.10:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.11:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:pix_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/h:sun:cobalt_raq_4:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*
  • OR cpe:/h:sun:cobalt_raq_xtr:*:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:-:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11000:*:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_professional:-:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:9.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.15:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.16:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:current:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:6.0:*:*:*:workstation:*:*:*
  • OR cpe:/a:oracle:application_server:9.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:-:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.8:-:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.19:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.23:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ciscoworks_1105_hosting_solution_engine:*:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ciscoworks_1105_wireless_lan_solution_engine:*:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_community:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.1(11)e:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:network_analysis_module:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:threat_response:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:ciscoworks_common_management_foundation:-:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.1:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:http_server:9.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:http_server:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:http_server:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21f:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/a:sun:one_application_server:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp10:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp11:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp12:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp13:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp2:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp3:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp4:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp5:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp6:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp7:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp8:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp9:*:*:*:*:*:*
  • OR cpe:/a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.10f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.10m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.11f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.11m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.15f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.15m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.16f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.16m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.17:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.17f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.17m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.18:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.18f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.18m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.19f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.19m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.2f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.2m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.3f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.3m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.4f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.4m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.5f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.5m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.6f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.6m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.7f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.7m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.8f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.8m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.9f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.9m:*:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp4:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp5:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp3:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp2:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030543
    V
    CVE-2003-0543
    2015-11-16
    oval:org.mitre.oval:def:4254
    V
    OpenSSL Integer Overflow Vulnerability
    2014-08-18
    oval:org.mitre.oval:def:5292
    V
    Multiple Vendor OpenSSL 0.9.6, 0.9.7 ASN.1 Vulnerabilities
    2008-09-08
    oval:org.debian:def:394
    V
    ASN.1 parsing vulnerability
    2003-10-11
    oval:org.debian:def:393
    V
    denial of service
    2003-10-01
    BACK
    openssl openssl 0.9.6
    openssl openssl 0.9.7
    openssl openssl 0.9.7a
    openssl openssl 0.9.6i
    openssl openssl 0.9.7
    cisco ios 12.2sx
    cisco ios 12.2sy
    openssl openssl 0.9.6a
    openssl openssl 0.9.7b
    openssl openssl 0.9.6
    openssl openssl 0.9.6 beta1
    openssl openssl 0.9.6 beta2
    openssl openssl 0.9.6 beta3
    openssl openssl 0.9.6a beta1
    openssl openssl 0.9.6a beta2
    openssl openssl 0.9.6a beta3
    openssl openssl 0.9.6b
    openssl openssl 0.9.6c
    openssl openssl 0.9.6d
    openssl openssl 0.9.6e
    openssl openssl 0.9.6f
    openssl openssl 0.9.6g
    openssl openssl 0.9.6h
    openssl openssl 0.9.6j
    openssl openssl 0.9.7 beta1
    openssl openssl 0.9.7 beta2
    openssl openssl 0.9.7 beta3
    openssl openssl 0.9.7 beta4
    openssl openssl 0.9.7 beta5
    openssl openssl 0.9.7 beta6
    sgi irix 6.0.1
    sgi irix 6.1
    sgi irix 6.2
    sgi irix 6.3
    sgi irix 6.4
    cisco firewall services module *
    sgi irix 6.5
    hp hp-ux 11.00
    sgi irix 6.0
    sgi irix 6.5.1
    sgi irix 6.5.2
    sgi irix 6.5.3
    sgi irix 6.5.4
    freebsd freebsd 4.0
    freebsd freebsd 5.0
    redhat linux 7
    hp hp-ux 11.11
    freebsd freebsd 4.1
    netbsd netbsd 1.5
    oracle database server 8.1.7
    sgi irix 6.5.7
    freebsd freebsd 4.2
    engardelinux secure community 1.0.1
    redhat linux 7.1
    sgi irix 6.5.5
    sgi irix 6.5.6
    sgi irix 6.5.8
    turbolinux turbolinux server 6.5
    suse suse linux 7.2
    cisco sn 5420 storage router *
    freebsd freebsd 4.3
    conectiva linux 7.0
    netbsd netbsd 1.5.1
    redhat linux 7.2
    hp hp-ux 11.20
    suse suse linux 7.3
    freebsd freebsd 4.4
    sgi irix 6.5.9
    sgi irix 6.5.10
    sgi irix 6.5.11
    netbsd netbsd 1.5.2
    cisco pix firewall *
    sun cobalt raq 4 *
    suse suse linux firewall *
    suse suse linux database server *
    suse suse email server iii
    suse suse linux connectivity server *
    sun cobalt raq xtr *
    sgi irix 6.5.12
    sgi irix 6.5.13
    sgi irix 6.5.14
    mandrakesoft mandrake linux 8.2
    suse suse linux 8.0
    conectiva linux 8.0
    redhat linux 7.3
    freebsd freebsd 4.5
    sun solaris 9
    debian debian linux 3.0
    cisco content services switch 11000 *
    freebsd freebsd 4.6
    slackware slackware linux 8.1
    engardelinux secure professional -
    openpkg openpkg current
    sun one web server 6.0
    sun one web server 4.1
    oracle application server 9.0.2
    gentoo linux *
    sgi irix 6.5.15
    sgi irix 6.5.16
    suse suse linux office server *
    netbsd netbsd 1.5.3
    netbsd netbsd 1.6
    redhat linux 8.0
    hp hp-ux 11.22
    mandrakesoft mandrake linux 9.0
    suse suse email server 3.1
    suse suse linux 8.1
    suse linux enterprise server 8
    mandrakesoft mandrake multi network firewall 8.2
    netbsd netbsd current
    slackware slackware linux current
    turbolinux turbolinux server 6.1
    openpkg openpkg 1.2
    turbolinux turbolinux workstation 6.0
    oracle application server 9.0.3
    freebsd freebsd 4.7
    mandrakesoft mandrake linux corporate server 2.1
    freebsd freebsd 4.8
    mandrakesoft mandrake linux 9.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat linux 9.0
    slackware slackware linux 9.0
    suse suse linux 8.2
    redhat enterprise linux 2.1
    conectiva linux 9.0
    sgi irix 6.5.19
    hp hp-ux 11.23
    sgi irix 6.5.20
    netbsd netbsd 1.6.1
    openpkg openpkg 1.3
    cisco ciscoworks 1105 hosting solution engine *
    cisco ciscoworks 1105 wireless lan solution engine *
    sgi irix 6.5.21
    engardelinux secure community 2.0
    slackware slackware linux 9.1
    cisco ios 12.1(11)e
    cisco network analysis module *
    cisco threat response *
    cisco application and content networking software *
    cisco ciscoworks common management foundation -
    suse suse linux 9.0
    mandrakesoft mandrake linux 9.2
    freebsd freebsd 5.1
    oracle application server 1.0.2.2
    oracle application server 1.0.2.1s
    oracle http server 9.2.0
    oracle http server 9.0.1
    oracle http server 8.1.7
    sun one web server 6.1
    sgi irix 6.5.21m
    sgi irix 6.5.21f
    redhat linux advanced workstation 2.1
    sun one application server 7.0
    mandrakesoft mandrake linux 9.1
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux corporate server 2.1
    sun one web server 4.1 sp1
    sun one web server 4.1 sp10
    sun one web server 4.1 sp11
    sun one web server 4.1 sp12
    sun one web server 4.1 sp13
    sun one web server 4.1 sp2
    sun one web server 4.1 sp3
    sun one web server 4.1 sp4
    sun one web server 4.1 sp5
    sun one web server 4.1 sp6
    sun one web server 4.1 sp7
    sun one web server 4.1 sp8
    sun one web server 4.1 sp9
    vmware gsx server 2.5.1
    vmware gsx server 2.5.1_build_5336
    sgi irix 6.5.10f
    sgi irix 6.5.10m
    sgi irix 6.5.11f
    sgi irix 6.5.11m
    sgi irix 6.5.12f
    sgi irix 6.5.12m
    sgi irix 6.5.13f
    sgi irix 6.5.13m
    sgi irix 6.5.14f
    sgi irix 6.5.14m
    sgi irix 6.5.15f
    sgi irix 6.5.15m
    sgi irix 6.5.16f
    sgi irix 6.5.16m
    sgi irix 6.5.17
    sgi irix 6.5.17f
    sgi irix 6.5.17m
    sgi irix 6.5.18
    sgi irix 6.5.18f
    sgi irix 6.5.18m
    sgi irix 6.5.19f
    sgi irix 6.5.19m
    sgi irix 6.5.20f
    sgi irix 6.5.20m
    sgi irix 6.5.2f
    sgi irix 6.5.2m
    sgi irix 6.5.3f
    sgi irix 6.5.3m
    sgi irix 6.5.4f
    sgi irix 6.5.4m
    sgi irix 6.5.5f
    sgi irix 6.5.5m
    sgi irix 6.5.6f
    sgi irix 6.5.6m
    sgi irix 6.5.7f
    sgi irix 6.5.7m
    sgi irix 6.5.8f
    sgi irix 6.5.8m
    sgi irix 6.5.9f
    sgi irix 6.5.9m
    sun one web server 6.0 sp4
    sun one web server 6.0 sp5
    sun one web server 6.0 sp3
    sun one web server 6.0 sp2
    sun one web server 6.0 sp1