CVE-2004-0079
high-risk
Published 2004-11-23
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Do I need to act?
~
2.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (90)
Third Party Advisory
http://fedoranews.org/updates/FEDORA-2004-095.shtml
Mailing List
http://marc.info/?l=bugtraq&m=107953412903636&w=2
Mailing List
http://marc.info/?l=bugtraq&m=108403806509920&w=2
Broken Link
http://secunia.com/advisories/11139
Broken Link
http://secunia.com/advisories/17381
Broken Link
http://secunia.com/advisories/17398
Broken Link
http://secunia.com/advisories/17401
Broken Link
http://secunia.com/advisories/18247
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200403-03.xml
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm
and 70 more references
64
/ 100
high-risk
Severity
26/34 · High
Exploitability
5/34 · Minimal
Exposure
33/34 · Critical