CVE-2007-5135

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible.

References

ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc

http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html

http://lists.vmware.com/pipermail/security-announce/2008/000002.html

http://secunia.com/advisories/22130

http://secunia.com/advisories/27012

http://secunia.com/advisories/27021

http://secunia.com/advisories/27031

http://secunia.com/advisories/27051

http://secunia.com/advisories/27078

http://secunia.com/advisories/27097

http://secunia.com/advisories/27186

http://secunia.com/advisories/27205

http://secunia.com/advisories/27217

http://secunia.com/advisories/27229

http://secunia.com/advisories/27330

http://secunia.com/advisories/27394

http://secunia.com/advisories/27851

http://secunia.com/advisories/27870

http://secunia.com/advisories/27961

http://secunia.com/advisories/28368

http://secunia.com/advisories/29242

http://secunia.com/advisories/30124

http://secunia.com/advisories/30161

http://secunia.com/advisories/31308

http://secunia.com/advisories/31326

http://secunia.com/advisories/31467

http://secunia.com/advisories/31489

http://security.freebsd.org/advisories/FreeBSD-SA-07:08.openssl.asc

http://security.gentoo.org/glsa/glsa-200710-06.xml

http://securityreason.com/securityalert/3179

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103130-1

http://sunsolve.sun.com/search/document.do?assetkey=1-66-200858-1

http://support.avaya.com/elmodocs2/security/ASA-2007-485.htm

http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0241

http://www.debian.org/security/2007/dsa-1379

http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml

http://www.mandriva.com/security/advisories?name=MDKSA-2007:193

http://www.novell.com/linux/security/advisories/2007_20_sr.html

http://www.openbsd.org/errata40.html

http://www.openbsd.org/errata41.html

http://www.openbsd.org/errata42.html

http://www.openssl.org/news/secadv_20071012.txt

http://www.redhat.com/support/errata/RHSA-2007-0813.html

http://www.redhat.com/support/errata/RHSA-2007-0964.html

http://www.redhat.com/support/errata/RHSA-2007-1003.html

http://www.securityfocus.com/archive/1/480855/100/0/threaded

http://www.securityfocus.com/archive/1/481217/100/0/threaded

http://www.securityfocus.com/archive/1/481488/100/0/threaded

http://www.securityfocus.com/archive/1/481506/100/0/threaded

http://www.securityfocus.com/archive/1/484353/100/0/threaded

http://www.securityfocus.com/archive/1/485936/100/0/threaded

http://www.securityfocus.com/archive/1/486859/100/0/threaded

http://www.securityfocus.com/bid/25831

http://www.securitytracker.com/id?1018755

http://www.vmware.com/security/advisories/VMSA-2008-0001.html

http://www.vmware.com/security/advisories/VMSA-2008-0013.html

http://www.vupen.com/english/advisories/2007/3325

http://www.vupen.com/english/advisories/2007/3625

http://www.vupen.com/english/advisories/2007/4042

http://www.vupen.com/english/advisories/2007/4144

http://www.vupen.com/english/advisories/2008/0064

http://www.vupen.com/english/advisories/2008/2268

http://www.vupen.com/english/advisories/2008/2361

http://www.vupen.com/english/advisories/2008/2362

http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4037

http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4038

https://bugs.gentoo.org/show_bug.cgi?id=194039

https://exchange.xforce.ibmcloud.com/vulnerabilities/36837

https://issues.rpath.com/browse/RPL-1769

https://issues.rpath.com/browse/RPL-1770

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10904

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5337

https://usn.ubuntu.com/522-1/

https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html

Details

Source: MITRE

Published: 2007-09-27

Updated: 2018-10-15

Type: CWE-189

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

Tenable Plugins

View all (43 total)

IDNameProductFamilySeverity
127201NewStart CGSL CORE 5.04 / MAIN 5.04 : openssl Multiple Vulnerabilities (NS-SA-2019-0033)NessusNewStart CGSL Local Security Checks
critical
127177NewStart CGSL CORE 5.04 / MAIN 5.04 : openssl098e Multiple Vulnerabilities (NS-SA-2019-0020)NessusNewStart CGSL Local Security Checks
critical
125001EulerOS Virtualization 3.0.1.0 : openssl (EulerOS-SA-2019-1548)NessusHuawei Local Security Checks
high
107877Solaris 10 (x86) : 121230-02NessusSolaris Local Security Checks
critical
107376Solaris 10 (sparc) : 121229-02NessusSolaris Local Security Checks
critical
86017F5 Networks BIG-IP : OpenSSL SSL_get_shared_ciphers vulnerability (SOL8106)NessusF5 Networks Local Security Checks
critical
79964GLSA-201412-11 : AMD64 x86 emulation base libraries: Multiple vulnerabilities (Heartbleed)NessusGentoo Local Security Checks
critical
67585Oracle Linux 5 : openssl (ELSA-2007-0964)NessusOracle Linux Local Security Checks
high
67559Oracle Linux 3 : openssl (ELSA-2007-0813)NessusOracle Linux Local Security Checks
medium
67058CentOS 4 : openssl (CESA-2007:1003)NessusCentOS Local Security Checks
medium
60307Scientific Linux Security Update : openssl on SL4.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60273Scientific Linux Security Update : openssl on SL3.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60267Scientific Linux Security Update : openssl on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
17758OpenSSL < 0.9.7m / 0.9.8e Buffer Overflow (deprecated)NessusWeb Servers
medium
43658CentOS 5 : openssl (CESA-2007:0964)NessusCentOS Local Security Checks
high
41155SuSE9 Security Update : OpenSSL (YOU Patch Number 11843)NessusSuSE Local Security Checks
medium
40381VMSA-2008-0013 : Updated ESX packages for OpenSSL, net-snmp, perlNessusVMware ESX Local Security Checks
critical
40372VMSA-2008-0001 : Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packagesNessusVMware ESX Local Security Checks
high
33790Mac OS X Multiple Vulnerabilities (Security Update 2008-005)NessusMacOS X Local Security Checks
critical
31392SuSE 10 Security Update : compat-openssl097g (ZYPP Patch Number 5055)NessusSuSE Local Security Checks
medium
31391openSUSE 10 Security Update : compat-openssl097g (compat-openssl097g-5054)NessusSuSE Local Security Checks
medium
29544SuSE 10 Security Update : OpenSSL (ZYPP Patch Number 4477)NessusSuSE Local Security Checks
medium
28243RHEL 4 : openssl (RHSA-2007:1003)NessusRed Hat Local Security Checks
medium
28127Ubuntu 6.06 LTS / 6.10 / 7.04 : openssl vulnerabilities (USN-522-1)NessusUbuntu Local Security Checks
critical
27933Ubuntu 5.04 / 5.10 / 6.06 LTS : openssl vulnerabilities (USN-353-1)NessusUbuntu Local Security Checks
critical
27777Fedora 7 : openssl-0.9.8b-15.fc7 (2007-2530)NessusFedora Local Security Checks
high
27563RHEL 2.1 / 3 : openssl (RHSA-2007:0813)NessusRed Hat Local Security Checks
medium
27538CentOS 3 : openssl (CESA-2007:0813)NessusCentOS Local Security Checks
medium
27328openSUSE 10 Security Update : libopenssl-devel (libopenssl-devel-4476)NessusSuSE Local Security Checks
medium
27061Fedora Core 6 : openssl-0.9.8b-15.fc6 (2007-725)NessusFedora Local Security Checks
high
27052RHEL 5 : openssl (RHSA-2007:0964)NessusRed Hat Local Security Checks
high
26950Mandrake Linux Security Advisory : openssl (MDKSA-2007:193)NessusMandriva Local Security Checks
critical
26946GLSA-200710-06 : OpenSSL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
26209Debian DSA-1379-1 : openssl - off-by-one error/buffer overflowNessusDebian Local Security Checks
critical
4221OpenSSL < 0.9.8f Multiple VulnerabilitiesNessus Network MonitorWeb Servers
medium
24564Mandrake Linux Security Advisory : ntp (MDKSA-2006:178)NessusMandriva Local Security Checks
critical
24563Mandrake Linux Security Advisory : MySQL (MDKSA-2006:177)NessusMandriva Local Security Checks
critical
24558Mandrake Linux Security Advisory : openssl (MDKSA-2006:172-1)NessusMandriva Local Security Checks
critical
20275Solaris 10 (x86) : 121230-02NessusSolaris Local Security Checks
critical
20272Solaris 10 (sparc) : 121229-02NessusSolaris Local Security Checks
critical
13606Solaris 9 (x86) : 114568-29NessusSolaris Local Security Checks
critical
13543Solaris 9 (sparc) : 113713-30NessusSolaris Local Security Checks
critical
801056OpenSSL < 0.9.8f Multiple VulnerabilitiesLog Correlation EngineWeb Servers
high