CVE-2004-0079

Published Nov 23, 2004

Last updated 8 days ago

Overview

Description
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Source
cve@mitre.org
NVD status
Modified
Products
firewall_services_module, aaa_server, apache-based_web_server, clientless_vpn_gateway_4400, ciscoworks_common_management_foundation, ciscoworks_common_services, converged_communications_server, sg200, sg203, sg208, sg5, mac_os_x, mac_os_x_server, freebsd, hp-ux, openbsd, enterprise_linux, enterprise_linux_desktop, linux, openserver, ios, webstar, intuity_audix, vsu, firewall-1, provider-1, vpn-1, access_registrar, application_and_content_networking_software, css_secure_content_accelerator, css11000_content_services_switch, okena_stormwatch, pix_firewall, threat_response, webns, bsafe_ssl-j, wbem, speed_technologies_litespeed_web_server, instant_virtual_extranet, edirectory, imanager, openssl, openssl, propack, servercluster, stonebeat_fullcluster, stonebeat_securitycluster, stonebeat_webcluster, stonegate, stonegate_vpn_client, tarantella_enterprise, gsx_server, s8300, s8500, s8700, proxysg, call_manager, content_services_switch_11500, gss_4480_global_site_selector, gss_4490_global_site_selector, mds_9000, secure_content_accelerator, sidewinder, crypto_accelerator_4000, cacheos_ca_sa, pix_firewall_software

Risk scores

CVSS 3.1

Type
Primary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
5
Impact score
2.9
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:N/I:N/A:P

Weaknesses

nvd@nist.gov
CWE-476
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-476

Social media

Hype score
Not currently trending

Vendor comments

  • Red HatRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

Configurations

References

Sources include official advisories and independent security research.