CVE-2004-0079

MEDIUM

Description

The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.

References

ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc

ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc

ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834

http://docs.info.apple.com/article.html?artnum=61798

http://fedoranews.org/updates/FEDORA-2004-095.shtml

http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html

http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html

http://lists.apple.com/mhonarc/security-announce/msg00045.html

http://marc.info/?l=bugtraq&m=107953412903636&w=2

http://marc.info/?l=bugtraq&m=108403806509920&w=2

http://secunia.com/advisories/11139

http://secunia.com/advisories/17381

http://secunia.com/advisories/17398

http://secunia.com/advisories/17401

http://secunia.com/advisories/18247

http://security.gentoo.org/glsa/glsa-200403-03.xml

http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524

http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm

http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US

http://www.ciac.org/ciac/bulletins/o-101.shtml

http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml

http://www.debian.org/security/2004/dsa-465

http://www.kb.cert.org/vuls/id/288574

http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html

http://www.mandriva.com/security/advisories?name=MDKSA-2004:023

http://www.novell.com/linux/security/advisories/2004_07_openssl.html

http://www.openssl.org/news/secadv_20040317.txt

http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html

http://www.redhat.com/support/errata/RHSA-2004-120.html

http://www.redhat.com/support/errata/RHSA-2004-121.html

http://www.redhat.com/support/errata/RHSA-2004-139.html

http://www.redhat.com/support/errata/RHSA-2005-829.html

http://www.redhat.com/support/errata/RHSA-2005-830.html

http://www.securityfocus.com/bid/9899

http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961

http://www.trustix.org/errata/2004/0012

http://www.uniras.gov.uk/vuls/2004/224012/index.htm

http://www.us-cert.gov/cas/techalerts/TA04-078A.html

https://exchange.xforce.ibmcloud.com/vulnerabilities/15505

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779

Details

Source: MITRE

Published: 2004-11-23

Updated: 2018-10-30

Risk Information

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*

cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*

cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*

cpe:2.3:h:cisco:firewall_services_module:1.1_\(3.005\):*:*:*:*:*:*:*

cpe:2.3:h:cisco:firewall_services_module:2.1_\(0.208\):*:*:*:*:*:*:*

cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*

cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*

cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*

cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*

cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*

cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*

cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*

cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*

cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*

cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*

cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*

cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*

cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*

cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*

cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*

cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*

cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*

cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*

cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*

cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*

cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*

cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*

Configuration 3

AND

OR

cpe:2.3:o:cisco:ios:12.1\(11\)e:*:*:*:*:*:*:*

cpe:2.3:o:cisco:ios:12.1\(11b\)e:*:*:*:*:*:*:*

cpe:2.3:o:cisco:ios:12.1\(11b\)e12:*:*:*:*:*:*:*

cpe:2.3:o:cisco:ios:12.1\(11b\)e14:*:*:*:*:*:*:*

cpe:2.3:o:cisco:ios:12.1\(13\)e9:*:*:*:*:*:*:*

cpe:2.3:o:cisco:ios:12.1\(19\)e1:*:*:*:*:*:*:*

cpe:2.3:o:cisco:ios:12.2\(14\)sy:*:*:*:*:*:*:*

cpe:2.3:o:cisco:ios:12.2\(14\)sy1:*:*:*:*:*:*:*

cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*

cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*

OR

cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*

cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*

cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*

cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*

cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*

cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*

cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*

cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*

cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*

cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*

cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*

cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*

cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*

cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*

cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*

cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*

cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*

cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*

cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*

cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*

cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*

cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*

cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*

cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*

cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*

cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*

cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*

cpe:2.3:a:checkpoint:vpn-1:next_generation_fp2:*:*:*:*:*:*:*

cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*

cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*

cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*

cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*

cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*

cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*

cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*

cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*

cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*

cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*

cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*

cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*

cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*

cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*

cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*

cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*

cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*

cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*

cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*

cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*

cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*

cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*

cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*

cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*

cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*

cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*

cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*

cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*

cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*

cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*

cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*

cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*

cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*

cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*

cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*

cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*

cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*

cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*

cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*

cpe:2.3:a:rsa:bsafe_ssl-j_sdk:3.0:*:*:*:*:*:*:*

cpe:2.3:a:rsa:bsafe_ssl-j_sdk:3.0.1:*:*:*:*:*:*:*

cpe:2.3:a:rsa:bsafe_ssl-j_sdk:3.1:*:*:*:*:*:*:*

cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*

cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*

cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*

cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*

cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*

cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*

cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*

cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*

cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*

cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*

cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*

cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*

cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*

cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*

cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*

cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*

cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*

cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*

cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*

cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*

cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*

cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*

cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*

cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*

cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*

cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*

cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*

cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*

cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*

cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*

cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*

cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*

cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.0\(1\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.0\(2\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.0\(3\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.0\(4\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.0\(4.101\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.1\(1\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.1\(2\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.1\(3\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.1\(4\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.1\(5\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.2\(1\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.2\(2\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.2\(3\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.2\(3.100\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.3\(1\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.3\(2\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.3\(3.102\):*:*:*:*:*:*:*

cpe:2.3:o:cisco:pix_firewall_software:6.3\(3.109\):*:*:*:*:*:*:*

Tenable Plugins

View all (30 total)

IDNameProductFamilySeverity
17750OpenSSL < 0.9.6m / 0.9.7d Denial of ServiceNessusWeb Servers
medium
37800FreeBSD : OpenSSL ChangeCipherSpec denial-of-service vulnerability (68233cba-7774-11d8-89ed-0020ed76ef5a)NessusFreeBSD Local Security Checks
medium
21870CentOS 3 / 4 : openssl096b (CESA-2005:830)NessusCentOS Local Security Checks
medium
20146RHEL 2.1 : openssl (RHSA-2005:829)NessusRed Hat Local Security Checks
medium
20141RHEL 3 / 4 : openssl096b (RHSA-2005:830)NessusRed Hat Local Security Checks
medium
20114Fedora Core 3 : openssl096b-0.9.6b-21.42 (2005-1042)NessusFedora Local Security Checks
medium
19463Mac OS X Multiple Vulnerabilities (Security Update 2005-007)NessusMacOS X Local Security Checks
critical
18785Slackware 8.1 / 9.0 / 9.1 / current : OpenSSL security update (SSA:2004-077-01)NessusSlackware Local Security Checks
medium
17534HP-UX PHSS_30650 : HP-UX Running Apache, Remote Denial of Service (DoS) (HPSBUX01019 SSRT4717 rev.3)NessusHP-UX Local Security Checks
medium
17533HP-UX PHSS_30649 : HP-UX Running Apache, Remote Denial of Service (DoS) (HPSBUX01019 SSRT4717 rev.3)NessusHP-UX Local Security Checks
medium
17532HP-UX PHSS_30648 : s700_800 11.04 Virtualvault 4.5 OWS updateNessusHP-UX Local Security Checks
medium
17531HP-UX PHSS_30646 : HP-UX Running Apache, Remote Denial of Service (DoS) (HPSBUX01019 SSRT4717 rev.3)NessusHP-UX Local Security Checks
medium
17530HP-UX PHSS_30645 : HP-UX Running Apache, Remote Denial of Service (DoS) (HPSBUX01019 SSRT4717 rev.3)NessusHP-UX Local Security Checks
medium
17529HP-UX PHSS_30644 : HP-UX Running Apache, Remote Denial of Service (DoS) (HPSBUX01019 SSRT4717 rev.3)NessusHP-UX Local Security Checks
medium
17528HP-UX PHSS_30643 : HP-UX Running Apache, Remote Denial of Service (DoS) (HPSBUX01019 SSRT4717 rev.3)NessusHP-UX Local Security Checks
medium
17527HP-UX PHSS_30642 : HP-UX Running Apache, Remote Denial of Service (DoS) (HPSBUX01019 SSRT4717 rev.3)NessusHP-UX Local Security Checks
medium
17526HP-UX PHSS_30641 : HP-UX Running Apache, Remote Denial of Service (DoS) (HPSBUX01019 SSRT4717 rev.3)NessusHP-UX Local Security Checks
medium
17525HP-UX PHSS_30640 : HP-UX Running Apache, Remote Denial of Service (DoS) (HPSBUX01019 SSRT4717 rev.3)NessusHP-UX Local Security Checks
medium
17071HP-UX PHSS_30639 : HP-UX Running Apache, Remote Denial of Service (DoS) (HPSBUX01019 SSRT4717 rev.3)NessusHP-UX Local Security Checks
medium
17070HP-UX PHSS_30647 : s700_800 11.04 Virtualvault 4.5 IWS UpdateNessusHP-UX Local Security Checks
medium
15302Debian DSA-465-1 : openssl - several vulnerabilitiesNessusDebian Local Security Checks
medium
2183OpenSSL < 0.9.6m / 0.9.7d Multiple DoSNessus Network MonitorWeb Servers
medium
14454GLSA-200403-03 : Multiple OpenSSL VulnerabilitiesNessusGentoo Local Security Checks
medium
14122Mandrake Linux Security Advisory : openssl (MDKSA-2004:023)NessusMandriva Local Security Checks
medium
13825SuSE-SA:2004:007: opensslNessusSuSE Local Security Checks
medium
13684Fedora Core 1 : openssl-0.9.7a-33.10 (2004-095)NessusFedora Local Security Checks
medium
12588FreeBSD : OpenSSL ChangeCipherSpec denial-of-service vulnerability (132)NessusFreeBSD Local Security Checks
medium
12480RHEL 3 : openssl (RHSA-2004:120)NessusRed Hat Local Security Checks
medium
12110OpenSSL < 0.9.6m / 0.9.7d Multiple Remote DoSNessusWeb Servers
medium
801058OpenSSL < 0.9.6m / 0.9.7d Multiple DoSLog Correlation EngineWeb Servers
medium