CVE-2003-0543
OpenSSL ASN.1 < 0.9.6j/0.9.7b - Brute Forcer for Parsing Bugs
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Integer overflow in OpenSSL 0.9.6 and 0.9.7 allows remote attackers to cause a denial of service (crash) via an SSL client certificate with certain ASN.1 tag values.
Desbordamiento de enteros en OpenSSL 0.9.6 y 0.9.7 permite a atacantes remotos causar una denegación de servicio (caída) mediante un certificado SSL de cliente con ciertos valores en la etiqueta ASN.1.
Brute forcer for OpenSSL ASN.1 parsing bugs that affects versions 0.9.6j and below and 0.9.7b and below.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2003-07-14 CVE Reserved
- 2003-09-30 CVE Published
- 2003-10-09 First Exploit
- 2024-07-29 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (19)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/22249 | Third Party Advisory | |
http://www-1.ibm.com/support/docview.wss?uid=swg21247112 | X_refsource_confirm | |
http://www.cert.org/advisories/CA-2003-26.html | Third Party Advisory | |
http://www.kb.cert.org/vuls/id/255484 | Third Party Advisory | |
http://www.securityfocus.com/bid/8732 | Vdb Entry | |
http://www.uniras.gov.uk/vuls/2003/006489/openssl.htm | X_refsource_misc | |
http://www.vupen.com/english/advisories/2006/3900 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4254 | Signature | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5292 | Signature |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/146 | 2003-10-09 |
URL | Date | SRC |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2003-291.html | 2018-05-03 |
URL | Date | SRC |
---|---|---|
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=104893 | 2018-05-03 | |
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201029-1 | 2018-05-03 | |
http://www.debian.org/security/2003/dsa-393 | 2018-05-03 | |
http://www.debian.org/security/2003/dsa-394 | 2018-05-03 | |
http://www.linuxsecurity.com/advisories/engarde_advisory-3693.html | 2018-05-03 | |
http://www.redhat.com/support/errata/RHSA-2003-292.html | 2018-05-03 | |
https://access.redhat.com/security/cve/CVE-2003-0543 | 2003-09-30 | |
https://bugzilla.redhat.com/show_bug.cgi?id=104893 | 2003-09-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openssl Search vendor "Openssl" | Openssl Search vendor "Openssl" for product "Openssl" | 0.9.6 Search vendor "Openssl" for product "Openssl" and version "0.9.6" | - |
Affected
| ||||||
Openssl Search vendor "Openssl" | Openssl Search vendor "Openssl" for product "Openssl" | 0.9.7 Search vendor "Openssl" for product "Openssl" and version "0.9.7" | - |
Affected
|