First published: Thu Sep 28 2006(Updated: )
OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | =0.9.5a-beta2 | |
OpenSSL OpenSSL | =0.9.8b | |
OpenSSL OpenSSL | =0.9.6i | |
OpenSSL OpenSSL | =0.9.3 | |
OpenSSL OpenSSL | =0.9.8c | |
OpenSSL OpenSSL | =0.9.7c | |
OpenSSL OpenSSL | =0.9.5-beta1 | |
OpenSSL OpenSSL | =0.9.6d | |
OpenSSL OpenSSL | =0.9.1c | |
OpenSSL OpenSSL | =0.9.6 | |
OpenSSL OpenSSL | =0.9.7j | |
OpenSSL OpenSSL | =0.9.6a | |
OpenSSL OpenSSL | =0.9.4 | |
OpenSSL OpenSSL | =0.9.6a-beta2 | |
OpenSSL OpenSSL | =0.9.5a | |
OpenSSL OpenSSL | =0.9.6f | |
OpenSSL OpenSSL | =0.9.6-beta3 | |
OpenSSL OpenSSL | =0.9.6l | |
OpenSSL OpenSSL | =0.9.7k | |
OpenSSL OpenSSL | =0.9.7g | |
OpenSSL OpenSSL | =0.9.6e | |
OpenSSL OpenSSL | =0.9.7d | |
OpenSSL OpenSSL | =0.9.7 | |
OpenSSL OpenSSL | =0.9.6b | |
OpenSSL OpenSSL | =0.9.7e | |
OpenSSL OpenSSL | =0.9.7b | |
OpenSSL OpenSSL | =0.9.6a-beta1 | |
OpenSSL OpenSSL | =0.9.6k | |
OpenSSL OpenSSL | =0.9.8a | |
OpenSSL OpenSSL | =0.9.6g | |
OpenSSL OpenSSL | =0.9.6-beta2 | |
OpenSSL OpenSSL | =0.9.3a | |
OpenSSL OpenSSL | =0.9.6h | |
OpenSSL OpenSSL | =0.9.7i | |
OpenSSL OpenSSL | =0.9.7h | |
OpenSSL OpenSSL | =0.9.6j | |
OpenSSL OpenSSL | =0.9.8 | |
OpenSSL OpenSSL | =0.9.7a | |
OpenSSL OpenSSL | =0.9.6c | |
OpenSSL OpenSSL | =0.9.6-beta1 | |
OpenSSL OpenSSL | =0.9.6m | |
OpenSSL OpenSSL | =0.9.5-beta2 | |
OpenSSL OpenSSL | =0.9.2b | |
OpenSSL OpenSSL | =0.9.5 | |
OpenSSL OpenSSL | =0.9.5a-beta1 | |
OpenSSL OpenSSL | =0.9.6a-beta3 | |
OpenSSL OpenSSL | =0.9.7f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.