First published: Thu Nov 06 2003(Updated: )
OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recursion) via malformed ASN.1 sequences.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.1\(11\)e | |
Cisco IOS | =12.1\(11b\)e | |
Cisco IOS | =12.2sx | |
Cisco IOS | =12.2sy | |
Cisco Content Services Switch 11000 | ||
Cisco PIX | =6.2.2_.111 | |
OpenSSL | =0.9.6 | |
OpenSSL | =0.9.6a | |
OpenSSL | =0.9.6b | |
OpenSSL | =0.9.6c | |
OpenSSL | =0.9.6d | |
OpenSSL | =0.9.6e | |
OpenSSL | =0.9.6f | |
OpenSSL | =0.9.6g | |
OpenSSL | =0.9.6h | |
OpenSSL | =0.9.6i | |
OpenSSL | =0.9.6j | |
OpenSSL | =0.9.6k | |
OpenSSL | =0.9.7 | |
OpenSSL | =0.9.7a | |
OpenSSL | =0.9.7b | |
Cisco PIX Firewall | =6.0 | |
Cisco PIX Firewall | =6.0\(1\) | |
Cisco PIX Firewall | =6.0\(2\) | |
Cisco PIX Firewall | =6.0\(3\) | |
Cisco PIX Firewall | =6.0\(4\) | |
Cisco PIX Firewall | =6.0\(4.101\) | |
Cisco PIX Firewall | =6.1 | |
Cisco PIX Firewall | =6.1\(1\) | |
Cisco PIX Firewall | =6.1\(2\) | |
Cisco PIX Firewall | =6.1\(3\) | |
Cisco PIX Firewall | =6.1\(4\) | |
Cisco PIX Firewall | =6.1\(5\) | |
Cisco PIX Firewall | =6.2 | |
Cisco PIX Firewall | =6.2\(1\) | |
Cisco PIX Firewall | =6.2\(2\) | |
Cisco PIX Firewall | =6.2\(3\) | |
Cisco PIX Firewall | =6.3\(1\) | |
Cisco PIX Firewall | =6.3\(3.102\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0851 has a severity rating that indicates it can cause denial of service attacks.
To fix CVE-2003-0851, update OpenSSL to a version that is patched against this vulnerability.
CVE-2003-0851 affects several versions of OpenSSL along with Cisco IOS and Cisco PIX Firewall.
Yes, CVE-2003-0851 can be exploited remotely using malformed ASN.1 sequences.
Exploitation of CVE-2003-0851 can lead to a crash of the affected service, resulting in a denial of service.