CVE-2006-7250

The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
References
Link Resource
http://cvs.openssl.org/chngview?cn=22144 Patch
http://marc.info/?l=bugtraq&m=133728068926468&w=2
http://marc.info/?l=bugtraq&m=133728068926468&w=2
http://marc.info/?l=openssl-dev&m=115685408414194&w=2
http://secunia.com/advisories/36533
http://secunia.com/advisories/48153
http://secunia.com/advisories/48516
http://secunia.com/advisories/48899
http://www.mail-archive.com/openssl-dev%40openssl.org/msg30305.html
http://www.openwall.com/lists/oss-security/2012/02/27/10
http://www.openwall.com/lists/oss-security/2012/02/28/14
http://www.redhat.com/support/errata/RHSA-2009-1335.html
http://www.securityfocus.com/bid/52181
http://www.ubuntu.com/usn/USN-1424-1
https://bugzilla.novell.com/show_bug.cgi?id=748738 Patch
https://bugzilla.redhat.com/show_bug.cgi?id=798100 Patch
http://cvs.openssl.org/chngview?cn=22144 Patch
http://marc.info/?l=bugtraq&m=133728068926468&w=2
http://marc.info/?l=bugtraq&m=133728068926468&w=2
http://marc.info/?l=openssl-dev&m=115685408414194&w=2
http://secunia.com/advisories/36533
http://secunia.com/advisories/48153
http://secunia.com/advisories/48516
http://secunia.com/advisories/48899
http://www.mail-archive.com/openssl-dev%40openssl.org/msg30305.html
http://www.openwall.com/lists/oss-security/2012/02/27/10
http://www.openwall.com/lists/oss-security/2012/02/28/14
http://www.redhat.com/support/errata/RHSA-2009-1335.html
http://www.securityfocus.com/bid/52181
http://www.ubuntu.com/usn/USN-1424-1
https://bugzilla.novell.com/show_bug.cgi?id=748738 Patch
https://bugzilla.redhat.com/show_bug.cgi?id=798100 Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*

History

21 Nov 2024, 00:24

Type Values Removed Values Added
References () http://cvs.openssl.org/chngview?cn=22144 - Patch () http://cvs.openssl.org/chngview?cn=22144 - Patch
References () http://marc.info/?l=bugtraq&m=133728068926468&w=2 - () http://marc.info/?l=bugtraq&m=133728068926468&w=2 -
References () http://marc.info/?l=openssl-dev&m=115685408414194&w=2 - () http://marc.info/?l=openssl-dev&m=115685408414194&w=2 -
References () http://secunia.com/advisories/36533 - () http://secunia.com/advisories/36533 -
References () http://secunia.com/advisories/48153 - () http://secunia.com/advisories/48153 -
References () http://secunia.com/advisories/48516 - () http://secunia.com/advisories/48516 -
References () http://secunia.com/advisories/48899 - () http://secunia.com/advisories/48899 -
References () http://www.mail-archive.com/openssl-dev%40openssl.org/msg30305.html - () http://www.mail-archive.com/openssl-dev%40openssl.org/msg30305.html -
References () http://www.openwall.com/lists/oss-security/2012/02/27/10 - () http://www.openwall.com/lists/oss-security/2012/02/27/10 -
References () http://www.openwall.com/lists/oss-security/2012/02/28/14 - () http://www.openwall.com/lists/oss-security/2012/02/28/14 -
References () http://www.redhat.com/support/errata/RHSA-2009-1335.html - () http://www.redhat.com/support/errata/RHSA-2009-1335.html -
References () http://www.securityfocus.com/bid/52181 - () http://www.securityfocus.com/bid/52181 -
References () http://www.ubuntu.com/usn/USN-1424-1 - () http://www.ubuntu.com/usn/USN-1424-1 -
References () https://bugzilla.novell.com/show_bug.cgi?id=748738 - Patch () https://bugzilla.novell.com/show_bug.cgi?id=748738 - Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=798100 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=798100 - Patch

07 Nov 2023, 02:00

Type Values Removed Values Added
References
  • {'url': 'http://www.mail-archive.com/openssl-dev@openssl.org/msg30305.html', 'name': '[openssl-dev] 20120210 [openssl.org #2711] Fix possible NULL dereference on bad MIME headers', 'tags': [], 'refsource': 'MLIST'}
  • () http://www.mail-archive.com/openssl-dev%40openssl.org/msg30305.html -

Information

Published : 2012-02-29 11:55

Updated : 2024-11-21 00:24


NVD link : CVE-2006-7250

Mitre link : CVE-2006-7250

CVE.ORG link : CVE-2006-7250


JSON object : View

Products Affected

openssl

  • openssl