CVE-2004-0079

The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
References
Link Resource
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc Broken Link
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc Broken Link
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt Broken Link
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834 Broken Link
http://docs.info.apple.com/article.html?artnum=61798 Broken Link
http://fedoranews.org/updates/FEDORA-2004-095.shtml Third Party Advisory
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html Mailing List
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html Mailing List
http://lists.apple.com/mhonarc/security-announce/msg00045.html Broken Link
http://marc.info/?l=bugtraq&m=107953412903636&w=2 Mailing List
http://marc.info/?l=bugtraq&m=108403806509920&w=2 Mailing List
http://secunia.com/advisories/11139 Broken Link
http://secunia.com/advisories/17381 Broken Link
http://secunia.com/advisories/17398 Broken Link
http://secunia.com/advisories/17401 Broken Link
http://secunia.com/advisories/18247 Broken Link
http://security.gentoo.org/glsa/glsa-200403-03.xml Third Party Advisory
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524 Broken Link
http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm Third Party Advisory
http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US Broken Link
http://www.ciac.org/ciac/bulletins/o-101.shtml Broken Link
http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml Broken Link
http://www.debian.org/security/2004/dsa-465 Third Party Advisory
http://www.kb.cert.org/vuls/id/288574 Third Party Advisory US Government Resource
http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2004:023 Third Party Advisory
http://www.novell.com/linux/security/advisories/2004_07_openssl.html Broken Link
http://www.openssl.org/news/secadv_20040317.txt Third Party Advisory
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html Mailing List
http://www.redhat.com/support/errata/RHSA-2004-120.html Broken Link
http://www.redhat.com/support/errata/RHSA-2004-121.html Broken Link
http://www.redhat.com/support/errata/RHSA-2004-139.html Broken Link
http://www.redhat.com/support/errata/RHSA-2005-829.html Broken Link
http://www.redhat.com/support/errata/RHSA-2005-830.html Broken Link
http://www.securityfocus.com/bid/9899 Broken Link Third Party Advisory VDB Entry Vendor Advisory
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961 Broken Link
http://www.trustix.org/errata/2004/0012 Broken Link
http://www.uniras.gov.uk/vuls/2004/224012/index.htm Broken Link
http://www.us-cert.gov/cas/techalerts/TA04-078A.html Broken Link Third Party Advisory US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/15505 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firewall_services_module:1.1_\(3.005\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:firewall_services_module:2.1_\(0.208\):*:*:*:*:*:*:*
cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*
cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*
cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*
cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*
cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:cisco:ios:12.1\(11\)e:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1\(11b\)e:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1\(11b\)e12:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1\(11b\)e14:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1\(13\)e9:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1\(19\)e1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.2\(14\)sy:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.2\(14\)sy1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*
OR cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*
cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*
cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*
cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*
cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:vpn-1:next_generation_fp2:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*
cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*
cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*
cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*
cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*
cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*
cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*
cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*
cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*
cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*
cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*
cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*
cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*
cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*
cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*
cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*
cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*
cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*
cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*
cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*
cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*
cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*
cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*
cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(3\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(4\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(4.101\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1\(3\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1\(4\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1\(5\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.2\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.2\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.2\(3\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.2\(3.100\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.3\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.3\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.3\(3.102\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.3\(3.109\):*:*:*:*:*:*:*

History

28 Dec 2023, 15:33

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : unknown
v2 : 5.0
v3 : 7.5
References (CISCO) http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml - (CISCO) http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml - Broken Link
References (CERT-VN) http://www.kb.cert.org/vuls/id/288574 - US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/288574 - Third Party Advisory, US Government Resource
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-121.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-121.html - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-139.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-139.html - Broken Link
References (CONFIRM) http://docs.info.apple.com/article.html?artnum=61798 - (CONFIRM) http://docs.info.apple.com/article.html?artnum=61798 - Broken Link
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=107953412903636&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=107953412903636&w=2 - Mailing List
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2005-830.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2005-830.html - Broken Link
References (CONFIRM) http://www.openssl.org/news/secadv_20040317.txt - (CONFIRM) http://www.openssl.org/news/secadv_20040317.txt - Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870 - Broken Link
References (CONFIRM) http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US - (CONFIRM) http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US - Broken Link
References (SECUNIA) http://secunia.com/advisories/17398 - (SECUNIA) http://secunia.com/advisories/17398 - Broken Link
References (APPLE) http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html - (APPLE) http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html - Mailing List
References (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2004:023 - (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2004:023 - Third Party Advisory
References (MISC) http://www.uniras.gov.uk/vuls/2004/224012/index.htm - (MISC) http://www.uniras.gov.uk/vuls/2004/224012/index.htm - Broken Link
References (TRUSTIX) http://www.trustix.org/errata/2004/0012 - (TRUSTIX) http://www.trustix.org/errata/2004/0012 - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2005-829.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2005-829.html - Broken Link
References (SECUNIA) http://secunia.com/advisories/11139 - (SECUNIA) http://secunia.com/advisories/11139 - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-200403-03.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200403-03.xml - Third Party Advisory
References (SLACKWARE) http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961 - (SLACKWARE) http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961 - Broken Link
References (NETBSD) ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc - (NETBSD) ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975 - Broken Link
References (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834 - (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834 - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779 - Broken Link
References (DEBIAN) http://www.debian.org/security/2004/dsa-465 - (DEBIAN) http://www.debian.org/security/2004/dsa-465 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/9899 - Vendor Advisory (BID) http://www.securityfocus.com/bid/9899 - Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory
References (CONFIRM) http://lists.apple.com/mhonarc/security-announce/msg00045.html - (CONFIRM) http://lists.apple.com/mhonarc/security-announce/msg00045.html - Broken Link
References (CERT) http://www.us-cert.gov/cas/techalerts/TA04-078A.html - Third Party Advisory, US Government Resource (CERT) http://www.us-cert.gov/cas/techalerts/TA04-078A.html - Broken Link, Third Party Advisory, US Government Resource
References (FEDORA) http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html - (FEDORA) http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html - Mailing List
References (FEDORA) http://fedoranews.org/updates/FEDORA-2004-095.shtml - (FEDORA) http://fedoranews.org/updates/FEDORA-2004-095.shtml - Third Party Advisory
References (APPLE) http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html - (APPLE) http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html - Mailing List
References (SUNALERT) http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524 - (SUNALERT) http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524 - Broken Link
References (ENGARDE) http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html - (ENGARDE) http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html - Broken Link
References (SCO) ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt - (SCO) ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt - Broken Link
References (SUSE) http://www.novell.com/linux/security/advisories/2004_07_openssl.html - (SUSE) http://www.novell.com/linux/security/advisories/2004_07_openssl.html - Broken Link
References (FREEBSD) ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc - (FREEBSD) ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc - Broken Link
References (SECUNIA) http://secunia.com/advisories/17381 - (SECUNIA) http://secunia.com/advisories/17381 - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621 - Broken Link
References (CIAC) http://www.ciac.org/ciac/bulletins/o-101.shtml - (CIAC) http://www.ciac.org/ciac/bulletins/o-101.shtml - Broken Link
References (SECUNIA) http://secunia.com/advisories/18247 - (SECUNIA) http://secunia.com/advisories/18247 - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/15505 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/15505 - Third Party Advisory, VDB Entry
References (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm - (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm - Third Party Advisory
References (HP) http://marc.info/?l=bugtraq&m=108403806509920&w=2 - (HP) http://marc.info/?l=bugtraq&m=108403806509920&w=2 - Mailing List
References (SECUNIA) http://secunia.com/advisories/17401 - (SECUNIA) http://secunia.com/advisories/17401 - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-120.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-120.html - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770 - Broken Link
CWE NVD-CWE-Other CWE-476

Information

Published : 2004-11-23 05:00

Updated : 2024-02-28 10:24


NVD link : CVE-2004-0079

Mitre link : CVE-2004-0079

CVE.ORG link : CVE-2004-0079


JSON object : View

Products Affected

cisco

  • ciscoworks_common_services
  • webns
  • content_services_switch_11500
  • pix_firewall_software
  • okena_stormwatch
  • ios
  • pix_firewall
  • application_and_content_networking_software
  • mds_9000
  • threat_response
  • call_manager
  • css11000_content_services_switch
  • gss_4480_global_site_selector
  • css_secure_content_accelerator
  • secure_content_accelerator
  • firewall_services_module
  • access_registrar
  • ciscoworks_common_management_foundation
  • gss_4490_global_site_selector

checkpoint

  • vpn-1
  • provider-1
  • firewall-1

redhat

  • openssl
  • enterprise_linux_desktop
  • enterprise_linux
  • linux

hp

  • hp-ux
  • aaa_server
  • apache-based_web_server
  • wbem

securecomputing

  • sidewinder

sgi

  • propack

sco

  • openserver

avaya

  • vsu
  • s8500
  • sg200
  • intuity_audix
  • s8700
  • sg203
  • s8300
  • converged_communications_server
  • sg208
  • sg5

apple

  • mac_os_x
  • mac_os_x_server

openbsd

  • openbsd

stonesoft

  • stonegate_vpn_client
  • stonebeat_webcluster
  • servercluster
  • stonegate
  • stonebeat_fullcluster
  • stonebeat_securitycluster

vmware

  • gsx_server

openssl

  • openssl

novell

  • edirectory
  • imanager

tarantella

  • tarantella_enterprise

symantec

  • clientless_vpn_gateway_4400

4d

  • webstar

bluecoat

  • cacheos_ca_sa
  • proxysg

sun

  • crypto_accelerator_4000

lite

  • speed_technologies_litespeed_web_server

neoteris

  • instant_virtual_extranet

dell

  • bsafe_ssl-j

freebsd

  • freebsd
CWE
CWE-476

NULL Pointer Dereference