CVE编号
CVE-2007-4995利用情况
暂无补丁情况
官方补丁披露时间
2007-10-13漏洞描述
在0.9.8f之前的OpenSSL 0.9.8中的DTLS实现中的Off-by-one错误允许远程攻击者通过未指定的向量执行任意代码。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://bugs.gentoo.org/show_bug.cgi?id=195634 | |
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773 | |
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html | |
http://secunia.com/advisories/25878 | |
http://secunia.com/advisories/27205 | |
http://secunia.com/advisories/27217 | |
http://secunia.com/advisories/27271 | |
http://secunia.com/advisories/27363 | |
http://secunia.com/advisories/27434 | |
http://secunia.com/advisories/27933 | |
http://secunia.com/advisories/28084 | |
http://secunia.com/advisories/30161 | |
http://secunia.com/advisories/30220 | |
http://secunia.com/advisories/30852 | |
http://security.gentoo.org/glsa/glsa-200710-30.xml | |
http://securitytracker.com/id?1018810 | |
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738962 | |
http://www.debian.org/security/2008/dsa-1571 | |
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml | |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:237 | |
http://www.openssl.org/news/secadv_20071012.txt | |
http://www.redhat.com/support/errata/RHSA-2007-0964.html | |
http://www.securityfocus.com/archive/1/482167/100/0/threaded | |
http://www.securityfocus.com/bid/26055 | |
http://www.vupen.com/english/advisories/2007/3487 | |
http://www.vupen.com/english/advisories/2007/4219 | |
http://www.vupen.com/english/advisories/2008/1937/references | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/37185 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... | |
https://usn.ubuntu.com/534-1/ | |
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | openssl | openssl | 0.9.8 | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 0.9.8a | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 0.9.8b | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 0.9.8c | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 0.9.8d | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | 0.9.8e | - | |||||
运行在以下环境 | |||||||||
系统 | centos_5 | openssl | * |
Up to (excluding) 0.9.8b-8.3.el5_0.2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_4.0 | openssl | * |
Up to (excluding) 0.9.8c-4etch3 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_5 | openssl | * |
Up to (excluding) 0.9.8b-8.3.el5_0.2 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_6 | openssl | * |
Up to (excluding) 1.0.1e-58.0.1.ksplice1.el6_10 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | openssl | * |
Up to (excluding) 1.0.2k-16.0.1.ksplice1.el7_6.1 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 传输被破坏
- 服务器危害 服务器失陷
- 全网数量 N/A
还没有评论,来说两句吧...