Vulnerability Description
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Firewall Services Module | All versions |
| Hp | Aaa Server | All versions |
| Hp | Apache-Based Web Server | 2.0.43.00 |
| Symantec | Clientless Vpn Gateway 4400 | 5.0 |
| Cisco | Ciscoworks Common Management Foundation | 2.1 |
| Cisco | Ciscoworks Common Services | 2.2 |
| Avaya | Converged Communications Server | 2.0 |
| Avaya | Sg200 | 4.4 |
| Avaya | Sg203 | 4.4 |
| Avaya | Sg208 | All versions |
| Avaya | Sg5 | 4.2 |
| Apple | Mac Os X | 10.3.3 |
| Apple | Mac Os X Server | 10.3.3 |
| Freebsd | Freebsd | 4.8 |
| Hp | Hp-Ux | 8.05 |
| Openbsd | Openbsd | 3.3 |
| Redhat | Enterprise Linux | 3.0 |
| Redhat | Enterprise Linux Desktop | 3.0 |
| Redhat | Linux | 7.2 |
| Sco | Openserver | 5.0.6 |
Related Weaknesses (CWE)
References
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.ascBroken Link
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txtBroken Link
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834Broken Link
- http://docs.info.apple.com/article.html?artnum=61798Broken Link
- http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlMailing List
- http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlMailing List
- http://lists.apple.com/mhonarc/security-announce/msg00045.htmlBroken Link
- http://marc.info/?l=bugtraq&m=107953412903636&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=108403806509920&w=2Mailing ListThird Party Advisory
- http://secunia.com/advisories/11139Broken Link
- http://security.gentoo.org/glsa/glsa-200403-03.xmlThird Party Advisory
- http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524Broken Link
- http://www.ciac.org/ciac/bulletins/o-101.shtmlBroken Link
- http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtmlBroken Link
- http://www.kb.cert.org/vuls/id/484726Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2004-0112?
CVE-2004-0112 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote att...
How severe is CVE-2004-0112?
CVE-2004-0112 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0112?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Firewall Services Module, Hp Aaa Server, Hp Apache-Based Web Server, Symantec Clientless Vpn Gateway 4400, Cisco Ciscoworks Common Management Foundation.