Executive Summary

Informations
Name CVE-2010-0742 First vendor Publication 2010-06-03
Vendor Cve Last vendor Modification 2017-09-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0742

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-310 Cryptographic Issues

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12395
 
Oval ID: oval:org.mitre.oval:def:12395
Title: HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS)
Description: The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.
Family: unix Class: vulnerability
Reference(s): CVE-2010-0742
Version: 12
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24950
 
Oval ID: oval:org.mitre.oval:def:24950
Title: Vulnerability in OpenSSL before 0.9.8o and 1.x before 1.0.0a, allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code
Description: The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.
Family: windows Class: vulnerability
Reference(s): CVE-2010-0742
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): OpenSSL
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 263

OpenVAS Exploits

Date Description
2012-02-12 Name : Gentoo Security Advisory GLSA 201110-01 (openssl)
File : nvt/glsa_201110_01.nasl
2011-03-24 Name : Fedora Update for openssl FEDORA-2011-1255
File : nvt/gb_fedora_2011_1255_openssl_fc13.nasl
2011-01-04 Name : HP-UX Update for OpenSSL HPSBUX02610
File : nvt/gb_hp_ux_HPSBUX02610.nasl
2010-12-28 Name : Fedora Update for openssl FEDORA-2010-18736
File : nvt/gb_fedora_2010_18736_openssl_fc13.nasl
2010-11-23 Name : Fedora Update for openssl FEDORA-2010-17826
File : nvt/gb_fedora_2010_17826_openssl_fc12.nasl
2010-11-23 Name : Fedora Update for openssl FEDORA-2010-17847
File : nvt/gb_fedora_2010_17847_openssl_fc13.nasl
2010-06-25 Name : Fedora Update for openssl FEDORA-2010-9421
File : nvt/gb_fedora_2010_9421_openssl_fc11.nasl
2010-06-18 Name : Fedora Update for openssl FEDORA-2010-9574
File : nvt/gb_fedora_2010_9574_openssl_fc13.nasl
2010-06-18 Name : Fedora Update for openssl FEDORA-2010-9639
File : nvt/gb_fedora_2010_9639_openssl_fc12.nasl
2010-06-04 Name : OpenSSL Cryptographic Message Syntax Memory Corruption Vulnerability
File : nvt/gb_openssl_40502.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
65057 OpenSSL Cryptographic Message Syntax crypto/cms/cms_asn1.c OriginatorInfo Ele...

Snort® IPS/IDS

Date Description
2014-01-10 OpenSSL CMS structure OriginatorInfo memory corruption attempt
RuleID : 18766 - Revision : 9 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2015-09-10 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL17248.nasl - Type : ACT_GATHER_INFO
2012-01-04 Name : The remote SSL layer is affected by a denial of service vulnerability.
File : openssl_0_9_8p_1_0_0e.nasl - Type : ACT_GATHER_INFO
2011-10-10 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201110-01.nasl - Type : ACT_GATHER_INFO
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-9421.nasl - Type : ACT_GATHER_INFO
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-9574.nasl - Type : ACT_GATHER_INFO
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-9639.nasl - Type : ACT_GATHER_INFO
2010-06-03 Name : The remote web server has a SSL-related vulnerability.
File : openssl_1_0_0a.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/40502
CONFIRM http://cvs.openssl.org/chngview?cn=19693
http://cvs.openssl.org/filediff?f=openssl/crypto/cms/cms_asn1.c&v1=1.8&am...
http://rt.openssl.org/Ticket/Display.html?id=2211&user=guest&pass=guest
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
http://www.openssl.org/news/secadv_20100601.txt
https://bugzilla.redhat.com/show_bug.cgi?id=598738
https://kb.bluecoat.com/index?page=content&id=SA50
HP http://marc.info/?l=bugtraq&m=129138643405740&w=2
MLIST https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECUNIA http://secunia.com/advisories/40000
http://secunia.com/advisories/40024
http://secunia.com/advisories/42457
http://secunia.com/advisories/42724
http://secunia.com/advisories/42733
http://secunia.com/advisories/57353
VUPEN http://www.vupen.com/english/advisories/2010/1313
http://www.vupen.com/english/advisories/2010/3105

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Date Informations
2024-02-02 01:12:50
  • Multiple Updates
2024-02-01 12:03:31
  • Multiple Updates
2023-09-05 12:11:57
  • Multiple Updates
2023-09-05 01:03:22
  • Multiple Updates
2023-09-02 12:12:00
  • Multiple Updates
2023-09-02 01:03:24
  • Multiple Updates
2023-08-12 12:14:13
  • Multiple Updates
2023-08-12 01:03:24
  • Multiple Updates
2023-08-11 12:12:03
  • Multiple Updates
2023-08-11 01:03:32
  • Multiple Updates
2023-08-06 12:11:35
  • Multiple Updates
2023-08-06 01:03:26
  • Multiple Updates
2023-08-04 12:11:40
  • Multiple Updates
2023-08-04 01:03:27
  • Multiple Updates
2023-07-14 12:11:37
  • Multiple Updates
2023-07-14 01:03:25
  • Multiple Updates
2023-03-29 01:13:18
  • Multiple Updates
2023-03-28 12:03:31
  • Multiple Updates
2022-10-11 12:10:21
  • Multiple Updates
2022-10-11 01:03:13
  • Multiple Updates
2021-05-04 12:11:13
  • Multiple Updates
2021-04-22 01:11:45
  • Multiple Updates
2020-05-23 01:41:44
  • Multiple Updates
2020-05-23 00:25:22
  • Multiple Updates
2018-08-10 12:01:45
  • Multiple Updates
2017-09-19 09:23:40
  • Multiple Updates
2016-06-28 18:03:41
  • Multiple Updates
2016-04-26 19:36:57
  • Multiple Updates
2015-09-11 13:25:55
  • Multiple Updates
2014-03-26 13:21:51
  • Multiple Updates
2014-02-17 10:54:05
  • Multiple Updates
2014-01-19 21:26:39
  • Multiple Updates
2013-05-10 23:19:26
  • Multiple Updates