CVE-2009-0789

OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
References
Link Resource
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc
http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
http://marc.info/?l=bugtraq&m=124464882609472&w=2
http://marc.info/?l=bugtraq&m=124464882609472&w=2
http://marc.info/?l=bugtraq&m=127678688104458&w=2
http://secunia.com/advisories/34411 Vendor Advisory
http://secunia.com/advisories/34460 Vendor Advisory
http://secunia.com/advisories/34666
http://secunia.com/advisories/35065
http://secunia.com/advisories/35380 Vendor Advisory
http://secunia.com/advisories/35729 Vendor Advisory
http://secunia.com/advisories/36701 Vendor Advisory
http://secunia.com/advisories/42724 Vendor Advisory
http://secunia.com/advisories/42733 Vendor Advisory
http://securitytracker.com/id?1021906
http://sourceforge.net/project/shownotes.php?release_id=671059&group_id=116847
http://support.apple.com/kb/HT3865
http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html
http://www.openssl.org/news/secadv_20090325.txt Vendor Advisory
http://www.osvdb.org/52866
http://www.php.net/archive/2009.php#id2009-04-08-1
http://www.securityfocus.com/bid/34256 Patch
http://www.vupen.com/english/advisories/2009/0850 Vendor Advisory
http://www.vupen.com/english/advisories/2009/1020 Vendor Advisory
http://www.vupen.com/english/advisories/2009/1175 Vendor Advisory
http://www.vupen.com/english/advisories/2009/1548 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49433
https://kb.bluecoat.com/index?page=content&id=SA50
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc
http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
http://marc.info/?l=bugtraq&m=124464882609472&w=2
http://marc.info/?l=bugtraq&m=124464882609472&w=2
http://marc.info/?l=bugtraq&m=127678688104458&w=2
http://secunia.com/advisories/34411 Vendor Advisory
http://secunia.com/advisories/34460 Vendor Advisory
http://secunia.com/advisories/34666
http://secunia.com/advisories/35065
http://secunia.com/advisories/35380 Vendor Advisory
http://secunia.com/advisories/35729 Vendor Advisory
http://secunia.com/advisories/36701 Vendor Advisory
http://secunia.com/advisories/42724 Vendor Advisory
http://secunia.com/advisories/42733 Vendor Advisory
http://securitytracker.com/id?1021906
http://sourceforge.net/project/shownotes.php?release_id=671059&group_id=116847
http://support.apple.com/kb/HT3865
http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html
http://www.openssl.org/news/secadv_20090325.txt Vendor Advisory
http://www.osvdb.org/52866
http://www.php.net/archive/2009.php#id2009-04-08-1
http://www.securityfocus.com/bid/34256 Patch
http://www.vupen.com/english/advisories/2009/0850 Vendor Advisory
http://www.vupen.com/english/advisories/2009/1020 Vendor Advisory
http://www.vupen.com/english/advisories/2009/1175 Vendor Advisory
http://www.vupen.com/english/advisories/2009/1548 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49433
https://kb.bluecoat.com/index?page=content&id=SA50
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*

History

21 Nov 2024, 01:00

Type Values Removed Values Added
References () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc - () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc -
References () http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html - () http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html -
References () http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html - () http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html - () http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html -
References () http://marc.info/?l=bugtraq&m=124464882609472&w=2 - () http://marc.info/?l=bugtraq&m=124464882609472&w=2 -
References () http://marc.info/?l=bugtraq&m=127678688104458&w=2 - () http://marc.info/?l=bugtraq&m=127678688104458&w=2 -
References () http://secunia.com/advisories/34411 - Vendor Advisory () http://secunia.com/advisories/34411 - Vendor Advisory
References () http://secunia.com/advisories/34460 - Vendor Advisory () http://secunia.com/advisories/34460 - Vendor Advisory
References () http://secunia.com/advisories/34666 - () http://secunia.com/advisories/34666 -
References () http://secunia.com/advisories/35065 - () http://secunia.com/advisories/35065 -
References () http://secunia.com/advisories/35380 - Vendor Advisory () http://secunia.com/advisories/35380 - Vendor Advisory
References () http://secunia.com/advisories/35729 - Vendor Advisory () http://secunia.com/advisories/35729 - Vendor Advisory
References () http://secunia.com/advisories/36701 - Vendor Advisory () http://secunia.com/advisories/36701 - Vendor Advisory
References () http://secunia.com/advisories/42724 - Vendor Advisory () http://secunia.com/advisories/42724 - Vendor Advisory
References () http://secunia.com/advisories/42733 - Vendor Advisory () http://secunia.com/advisories/42733 - Vendor Advisory
References () http://securitytracker.com/id?1021906 - () http://securitytracker.com/id?1021906 -
References () http://sourceforge.net/project/shownotes.php?release_id=671059&group_id=116847 - () http://sourceforge.net/project/shownotes.php?release_id=671059&group_id=116847 -
References () http://support.apple.com/kb/HT3865 - () http://support.apple.com/kb/HT3865 -
References () http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html - () http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html -
References () http://www.openssl.org/news/secadv_20090325.txt - Vendor Advisory () http://www.openssl.org/news/secadv_20090325.txt - Vendor Advisory
References () http://www.osvdb.org/52866 - () http://www.osvdb.org/52866 -
References () http://www.php.net/archive/2009.php#id2009-04-08-1 - () http://www.php.net/archive/2009.php#id2009-04-08-1 -
References () http://www.securityfocus.com/bid/34256 - Patch () http://www.securityfocus.com/bid/34256 - Patch
References () http://www.vupen.com/english/advisories/2009/0850 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/0850 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/1020 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/1020 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/1175 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/1175 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/1548 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/1548 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/49433 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/49433 -
References () https://kb.bluecoat.com/index?page=content&id=SA50 - () https://kb.bluecoat.com/index?page=content&id=SA50 -

Information

Published : 2009-03-27 16:30

Updated : 2024-11-21 01:00


NVD link : CVE-2009-0789

Mitre link : CVE-2009-0789

CVE.ORG link : CVE-2009-0789


JSON object : View

Products Affected

openssl

  • openssl
CWE
CWE-189

Numeric Errors