CVE-2004-0112

Published Nov 23, 2004

Last updated 8 days ago

Overview

Description
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
Source
cve@mitre.org
NVD status
Modified
Products
firewall_services_module, aaa_server, apache-based_web_server, clientless_vpn_gateway_4400, ciscoworks_common_management_foundation, ciscoworks_common_services, converged_communications_server, sg200, sg203, sg208, sg5, mac_os_x, mac_os_x_server, freebsd, hp-ux, openbsd, enterprise_linux, enterprise_linux_desktop, linux, openserver, ios, webstar, intuity_audix, vsu, firewall-1, provider-1, vpn-1, access_registrar, application_and_content_networking_software, css_secure_content_accelerator, css11000_content_services_switch, okena_stormwatch, pix_firewall, threat_response, webns, bsafe_ssl-j, stonegate, wbem, litespeed_web_server, instant_virtual_extranet, edirectory, imanager, openssl, openssl, propack, servercluster, stonebeat_fullcluster, stonebeat_securitycluster, stonebeat_webcluster, tarantella_enterprise, gsx_server, s8300, s8500, s8700, proxysg, call_manager, content_services_switch_11500, gss_4480_global_site_selector, gss_4490_global_site_selector, mds_9000, secure_content_accelerator, sidewinder, crypto_accelerator_4000, cacheos_ca_sa, pix_firewall_software

Risk scores

CVSS 2.0

Type
Primary
Base score
5
Impact score
2.9
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:N/I:N/A:P

Weaknesses

nvd@nist.gov
CWE-125

Social media

Hype score
Not currently trending

Vendor comments

  • Red HatRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

Configurations

References

Sources include official advisories and independent security research.