Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2007-4995 First vendor Publication 2007-10-12
Vendor Cve Last vendor Modification 2018-10-15

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4995

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-189 Numeric Errors (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10288
 
Oval ID: oval:org.mitre.oval:def:10288
Title: Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.
Description: Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.
Family: unix Class: vulnerability
Reference(s): CVE-2007-4995
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17495
 
Oval ID: oval:org.mitre.oval:def:17495
Title: USN-534-1 -- openssl vulnerability
Description: Andy Polyakov discovered that the DTLS implementation in OpenSSL was vulnerable.
Family: unix Class: patch
Reference(s): USN-534-1
CVE-2007-4995
Version: 7
Platform(s): Ubuntu 6.06
Ubuntu 6.10
Ubuntu 7.04
Ubuntu 7.10
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23963
 
Oval ID: oval:org.mitre.oval:def:23963
Title: Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors
Description: Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.
Family: windows Class: vulnerability
Reference(s): CVE-2007-4995
Version: 7
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): OpenSSL
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 6

OpenVAS Exploits

Date Description
2009-05-05 Name : HP-UX Update for OpenSSL HPSBUX02296
File : nvt/gb_hp_ux_HPSBUX02296.nasl
2009-04-09 Name : Mandriva Update for openssl MDKSA-2007:237 (openssl)
File : nvt/gb_mandriva_MDKSA_2007_237.nasl
2009-03-23 Name : Ubuntu Update for openssl vulnerability USN-534-1
File : nvt/gb_ubuntu_USN_534_1.nasl
2009-02-27 Name : Fedora Update for openssl FEDORA-2007-2530
File : nvt/gb_fedora_2007_2530_openssl_fc7.nasl
2009-02-27 Name : Fedora Update for openssl FEDORA-2007-725
File : nvt/gb_fedora_2007_725_openssl_fc6.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200710-30 (openssl)
File : nvt/glsa_200710_30.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200805-07 (ltsp)
File : nvt/glsa_200805_07.nasl
2008-05-27 Name : Debian Security Advisory DSA 1571-1 (openssl)
File : nvt/deb_1571_1.nasl
2008-05-27 Name : Debian Security Advisory DSA 1576-1 (openssh)
File : nvt/deb_1576_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
37895 OpenSSL DTLS Implementation Unspecified Off-by-one Remote Code Execution

Nessus® Vulnerability Scanner

Date Description
2014-12-15 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201412-11.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2007-0964.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20071012_openssl_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-01-04 Name : The remote server is affected by multiple vulnerabilities.
File : openssl_0_9_8f.nasl - Type : ACT_GATHER_INFO
2010-01-06 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2007-0964.nasl - Type : ACT_GATHER_INFO
2008-05-19 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1576.nasl - Type : ACT_GATHER_INFO
2008-05-13 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1571.nasl - Type : ACT_GATHER_INFO
2008-05-11 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200805-07.nasl - Type : ACT_GATHER_INFO
2007-12-13 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_openssl-4559.nasl - Type : ACT_GATHER_INFO
2007-12-07 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2007-237.nasl - Type : ACT_GATHER_INFO
2007-11-10 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-534-1.nasl - Type : ACT_GATHER_INFO
2007-11-06 Name : The remote Fedora host is missing a security update.
File : fedora_2007-2530.nasl - Type : ACT_GATHER_INFO
2007-10-31 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200710-30.nasl - Type : ACT_GATHER_INFO
2007-10-24 Name : The remote openSUSE host is missing a security update.
File : suse_libopenssl-devel-4560.nasl - Type : ACT_GATHER_INFO
2007-10-16 Name : The remote Fedora Core host is missing a security update.
File : fedora_2007-725.nasl - Type : ACT_GATHER_INFO
2007-10-15 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2007-0964.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/26055
BUGTRAQ http://www.securityfocus.com/archive/1/482167/100/0/threaded
CONFIRM http://bugs.gentoo.org/show_bug.cgi?id=195634
http://www.openssl.org/news/secadv_20071012.txt
DEBIAN http://www.debian.org/security/2008/dsa-1571
FEDORA https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218...
GENTOO http://security.gentoo.org/glsa/glsa-200710-30.xml
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
HP http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773
MANDRIVA http://www.mandriva.com/security/advisories?name=MDKSA-2007:237
MISC http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738962
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2007-0964.html
SECTRACK http://securitytracker.com/id?1018810
SECUNIA http://secunia.com/advisories/25878
http://secunia.com/advisories/27205
http://secunia.com/advisories/27217
http://secunia.com/advisories/27271
http://secunia.com/advisories/27363
http://secunia.com/advisories/27434
http://secunia.com/advisories/27933
http://secunia.com/advisories/28084
http://secunia.com/advisories/30161
http://secunia.com/advisories/30220
http://secunia.com/advisories/30852
SUSE http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
UBUNTU https://usn.ubuntu.com/534-1/
VUPEN http://www.vupen.com/english/advisories/2007/3487
http://www.vupen.com/english/advisories/2007/4219
http://www.vupen.com/english/advisories/2008/1937/references
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/37185

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Date Informations
2024-02-02 01:07:21
  • Multiple Updates
2024-02-01 12:02:25
  • Multiple Updates
2023-09-05 12:06:52
  • Multiple Updates
2023-09-05 01:02:16
  • Multiple Updates
2023-09-02 12:06:58
  • Multiple Updates
2023-09-02 01:02:17
  • Multiple Updates
2023-08-12 12:08:05
  • Multiple Updates
2023-08-12 01:02:17
  • Multiple Updates
2023-08-11 12:07:01
  • Multiple Updates
2023-08-11 01:02:21
  • Multiple Updates
2023-08-06 12:06:42
  • Multiple Updates
2023-08-06 01:02:18
  • Multiple Updates
2023-08-04 12:06:47
  • Multiple Updates
2023-08-04 01:02:21
  • Multiple Updates
2023-07-14 12:06:46
  • Multiple Updates
2023-07-14 01:02:19
  • Multiple Updates
2023-03-29 01:07:35
  • Multiple Updates
2023-03-28 12:02:24
  • Multiple Updates
2022-10-11 12:06:00
  • Multiple Updates
2022-10-11 01:02:09
  • Multiple Updates
2021-05-04 12:06:25
  • Multiple Updates
2021-04-22 01:06:57
  • Multiple Updates
2020-05-23 00:20:29
  • Multiple Updates
2018-10-16 00:19:15
  • Multiple Updates
2018-10-04 00:19:30
  • Multiple Updates
2017-09-29 09:23:13
  • Multiple Updates
2017-07-29 12:02:33
  • Multiple Updates
2016-04-26 16:37:03
  • Multiple Updates
2014-12-16 13:24:26
  • Multiple Updates
2014-02-17 10:41:49
  • Multiple Updates
2013-05-11 10:36:56
  • Multiple Updates