Vulnerability Details : CVE-2003-0851
OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recursion) via malformed ASN.1 sequences.
Vulnerability category: Denial of service
Products affected by CVE-2003-0851
- cpe:2.3:o:cisco:ios:12.1\(11b\)e:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.1\(11\)e:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.1\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.1\(3\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.0\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.0\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.0\(3\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.1\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.2\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.3\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.3\(3.102\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.1\(4\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.1\(5\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.2\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.2\(3\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.0\(4\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.0\(4.101\):*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2003-0851
15.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0851
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2003-0851
-
http://marc.info/?l=bugtraq&m=106796246511667&w=2
-
http://rhn.redhat.com/errata/RHSA-2004-119.html
RHSA-2004:119 - Security Advisory - Red Hat Customer Portal
-
http://www.openssl.org/news/secadv_20031104.txt
Patch;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/412478
Patch;Third Party Advisory;US Government Resource
-
ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc
-
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-003.txt.asc
-
http://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtml
-
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html
[SECURITY] Fedora Core 3 Update: openssl096b-0.9.6b-21.42
-
http://marc.info/?l=bugtraq&m=108403850228012&w=2
'[FLSA-2004:1395] Updated OpenSSL resolves security vulnerability' - MARC
-
http://www.securityfocus.com/bid/8970
Patch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5528
Jump to