2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-0789" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2009-03-27T16:30:02.140" ,
2024-11-22 09:15:19 +00:00
"lastModified" : "2024-11-21T01:00:55.260" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key."
} ,
{
"lang" : "es" ,
"value" : "OpenSSL anterior a v0.9.8k en plataformas WIN64 y otras plataformas no maneja adecuadamente una estructura ASN.1 malformada, permitiendo a atacantes remotos provocar una denegaci\u00f3n de servicio (acceso de memoria inv\u00e1lido y ca\u00edda de la aplicaci\u00f3n) al poner esta estructura en la clave p\u00fablica de un certificado, como la utilizada por una clave p\u00fablica RSA."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P" ,
2024-11-22 09:15:19 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-22 09:15:19 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-189"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "0.9.8j" ,
"matchCriteriaId" : "B2328F75-7F29-4516-B702-5F3AD9B5603D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "14D983EC-61B0-4FD9-89B5-9878E4CE4405"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B5D7BE3C-8CA2-4FB2-B4AE-B201D88C2A9D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC4C5F05-BC0B-478D-9A6F-7C804777BA41"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "27F417A1-5D97-4BC4-8B97-5AC40236DA21"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8847BD34-BDE6-4AE9-96D9-75B9CF93A6A8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4EDB5A09-BE86-4352-9799-A875649EDB7D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "B6231CAA-00A8-41CE-8436-B84518014CF1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "A70AD93B-E876-4EAB-9970-752D42E15E99"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F03FA9C0-24C7-46AC-92EC-7834BC34C79B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "716ADA01-38B8-4C15-A3BB-D9688DA30599"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "B73326F7-7DCE-4EDE-95D7-AE7AED263A14"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B5E4742C-A983-4F00-B24F-AB280C0E876D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA2D251C-9C45-4EFE-8262-E88AB7CE713A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "6D81E175-E698-40EF-9601-425893FFB1FC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA0F25B7-A172-4300-8718-112E817A6165"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A0628DF-3A4C-4078-B615-22260671EABF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "52B1BE89-BAE0-4656-943B-B9B81D9B54B3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "D097222B-ED20-459C-9167-55751FA2C87A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "86DDC8F2-7920-4A73-927E-562C89806972"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "962FCB86-15AD-4399-8B7D-EC1DEA919C59"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "180D07AE-C571-4DD6-837C-43E2A946007A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "90789533-C741-4B1C-A24B-2C77B9E4DE5F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1520065B-46D7-48A4-B9D0-5B49F690C5B4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2AA526B9-726A-49D5-B3CA-EBE2DA303CA0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "494E48E7-EF86-4860-9A53-94F6C313746E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2636B92E-47D5-42EA-9585-A2B84FBE71CB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72FE2F46-2D0C-4C90-AFBE-D2E7B496D6E4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "45A518E8-21BE-4C5C-B425-410AB1208E9C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "9E3AB748-E463-445C-ABAB-4FEDDFD1878B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "660E4B8D-AABA-4520-BC4D-CF8E76E07C05"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "85BFEED5-4941-41BB-93D1-CD5C2A41290E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*" ,
"matchCriteriaId" : "9644CC68-1E91-45E7-8C53-1E3FC9976A4E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*" ,
"matchCriteriaId" : "9B1B98C4-1FFD-4A7C-AA86-A34BC6F7AB31"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*" ,
"matchCriteriaId" : "73934717-2DA3-4614-A076-D6EDA5EB0626"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78E79A05-64F3-4397-952C-A5BB950C967D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "549BB01D-F322-4FE3-BDA2-4FEA8ED8568A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4DE6CBD6-D6DD-4BC5-93F6-FDEA70163336"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "98693865-2E79-4BD6-9F89-1994BC9A3E73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D6476506-EC37-4726-82DC-D0E8254A8CDD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5D6ECEF7-CB16-4604-894B-6EB19F1CEF55"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1C81EF3D-4DB7-4799-9670-8D79E28CA184"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A8116A66-175C-4E6D-9A9B-D54C1D97D213"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "382C1679-DA1D-4FA4-9D5E-B86CC5052D49"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1CA28812-8A24-4FE1-BED9-D6D5BB023645"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9894D83E-2A27-446E-8B47-9C03CF802A2B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "55A9AC4D-E19B-431F-8679-B62F5F46BCF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A4E446D-B9D3-45F2-9722-B41FA14A6C31"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF4EA988-FC80-4170-8933-7C6663731981"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "64F8F53B-24A1-4877-B16E-F1917C4E4E81"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "75D3ACD5-905F-42BB-BE1A-8382E9D823BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "766EA6F2-7FA4-4713-9859-9971CCD2FDCB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EFBC30B7-627D-48DC-8EF0-AE8FA0C6EDBA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2BB38AEA-BAF0-4920-9A71-747C24444770"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1F33EA2B-DE15-4695-A383-7A337AC38908"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "261EE631-AB43-44FE-B02A-DFAAB8D35927"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA0E0BBF-D0BE-41A7-B9BB-C28F01000BC0"
}
]
}
]
}
] ,
"references" : [
{
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=124464882609472&w=2" ,
"source" : "secalert@redhat.com"
} ,
2024-11-22 09:15:19 +00:00
{
"url" : "http://marc.info/?l=bugtraq&m=124464882609472&w=2" ,
"source" : "secalert@redhat.com"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://marc.info/?l=bugtraq&m=127678688104458&w=2" ,
"source" : "secalert@redhat.com"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/34411" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/34460" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/34666" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://secunia.com/advisories/35065" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://secunia.com/advisories/35380" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/35729" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/36701" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/42724" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/42733" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1021906" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://sourceforge.net/project/shownotes.php?release_id=671059&group_id=116847" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://support.apple.com/kb/HT3865" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.openssl.org/news/secadv_20090325.txt" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/52866" ,
"source" : "secalert@redhat.com"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.php.net/archive/2009.php#id2009-04-08-1" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.securityfocus.com/bid/34256" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/0850" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/1020" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/1175" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/1548" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49433" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://kb.bluecoat.com/index?page=content&id=SA50" ,
"source" : "secalert@redhat.com"
2024-11-22 09:15:19 +00:00
} ,
{
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=124464882609472&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=124464882609472&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=127678688104458&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/34411" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/34460" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/34666" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/35065" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/35380" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/35729" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/36701" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/42724" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/42733" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://securitytracker.com/id?1021906" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://sourceforge.net/project/shownotes.php?release_id=671059&group_id=116847" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://support.apple.com/kb/HT3865" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.openssl.org/news/secadv_20090325.txt" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.osvdb.org/52866" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.php.net/archive/2009.php#id2009-04-08-1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/34256" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/0850" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/1020" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/1175" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/1548" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49433" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://kb.bluecoat.com/index?page=content&id=SA50" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
}
] ,
"vendorComments" : [
{
"organization" : "Red Hat" ,
"comment" : "Not vulnerable. This issue only affects a small number of operating systems and does not affect the openssl packages as shipped with Red Hat Enterprise Linux 2.1, 3, 4 or 5." ,
"lastModified" : "2009-03-30T00:00:00"
2023-04-24 12:24:31 +02:00
}
]
}