Executive Summary

Informations
NameCVE-2003-0545First vendor Publication2003-11-17
VendorCveLast vendor Modification2018-05-02

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Double free vulnerability in OpenSSL 0.9.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an SSL client certificate with a certain invalid ASN.1 encoding.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0545

CWE : Common Weakness Enumeration

%idName
100 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:2590
 
Oval ID: oval:org.mitre.oval:def:2590
Title: OpenSSL Double-free Vulnerability
Description: Double free vulnerability in OpenSSL 0.9.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an SSL client certificate with a certain invalid ASN.1 encoding.
Family: unix Class: vulnerability
Reference(s): CVE-2003-0545
Version: 3
Platform(s): Sun Solaris 8
Sun Solaris 9
Product(s): Sun Cluster
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application2

OpenVAS Exploits

DateDescription
2009-05-05Name : HP-UX Update for AAA Server HPSBUX00286
File : nvt/gb_hp_ux_HPSBUX00286.nasl
2009-05-05Name : HP-UX Update for HP WEBM Services HPSBUX00288
File : nvt/gb_hp_ux_HPSBUX00288.nasl
2009-05-05Name : HP-UX Update for BIND v920 HPSBUX00290
File : nvt/gb_hp_ux_HPSBUX00290.nasl
2008-01-17Name : Debian Security Advisory DSA 394-1 (openssl095)
File : nvt/deb_394_1.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
3684OpenSSL ASN.1 Client Certificate Double-free

Nessus® Vulnerability Scanner

DateDescription
2012-01-04Name : Arbitrary code could be executed on the remote server.
File : openssl_0_9_7c.nasl - Type : ACT_GATHER_INFO
2005-03-18Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHSS_29691.nasl - Type : ACT_GATHER_INFO
2005-03-18Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHSS_29891.nasl - Type : ACT_GATHER_INFO
2005-03-18Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHSS_29892.nasl - Type : ACT_GATHER_INFO
2005-03-18Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHSS_29893.nasl - Type : ACT_GATHER_INFO
2005-03-18Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHSS_30055.nasl - Type : ACT_GATHER_INFO
2005-03-18Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHSS_30056.nasl - Type : ACT_GATHER_INFO
2005-03-18Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHSS_30057.nasl - Type : ACT_GATHER_INFO
2005-03-18Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHSS_30058.nasl - Type : ACT_GATHER_INFO
2005-02-16Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_31726.nasl - Type : ACT_GATHER_INFO
2005-02-16Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHSS_29690.nasl - Type : ACT_GATHER_INFO
2005-02-16Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHSS_29894.nasl - Type : ACT_GATHER_INFO
2004-09-29Name : The remote Debian host is missing a security-related update.
File : debian_DSA-394.nasl - Type : ACT_GATHER_INFO
2004-07-31Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2003-098.nasl - Type : ACT_GATHER_INFO
2004-07-25Name : The remote host is missing a vendor-supplied security patch
File : suse_SA_2003_043.nasl - Type : ACT_GATHER_INFO
2004-07-06Name : The remote host is using an unsupported version of Mac OS X.
File : macosx_version.nasl - Type : ACT_GATHER_INFO
2003-10-10Name : The remote host is affected by a heap corruption vulnerability.
File : ssltest.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/8732
CERT http://www.cert.org/advisories/CA-2003-26.html
CERT-VN http://www.kb.cert.org/vuls/id/935264
CONFIRM http://www-1.ibm.com/support/docview.wss?uid=swg21247112
DEBIAN http://www.debian.org/security/2003/dsa-394
REDHAT http://www.redhat.com/support/errata/RHSA-2003-292.html
VUPEN http://www.vupen.com/english/advisories/2006/3900

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2018-05-03 09:19:25
  • Multiple Updates
2016-04-26 12:35:02
  • Multiple Updates
2014-02-17 10:26:22
  • Multiple Updates
2013-05-11 11:51:54
  • Multiple Updates