Search for packages
Package details: pkg:openssl/openssl@0.9.7h
purl pkg:openssl/openssl@0.9.7h
Next non-vulnerable version 0.9.7l
Latest non-vulnerable version 3.0.7
Risk 10.0
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-31sj-sdmb-aaaq
Aliases:
CVE-2006-2937
VC-OPENSSL-20060928-CVE-2006-2937
During the parsing of certain invalid ASN.1 structures an error condition is mishandled. This can result in an infinite loop which consumes system memory
0.9.7l
Affected by 0 other vulnerabilities.
0.9.8d
Affected by 56 other vulnerabilities.
VCID-3j45-cwzm-aaam
Aliases:
CVE-2006-3738
VC-OPENSSL-20060928-CVE-2006-3738
A buffer overflow was discovered in the SSL_get_shared_ciphers() utility function. An attacker could send a list of ciphers to an application that uses this function and overrun a buffer.
0.9.7l
Affected by 0 other vulnerabilities.
0.9.8d
Affected by 56 other vulnerabilities.
VCID-jpd6-6mb9-aaam
Aliases:
CVE-2006-2940
VC-OPENSSL-20060928-CVE-2006-2940
Certain types of public key can take disproportionate amounts of time to process. This could be used by an attacker in a denial of service attack.
0.9.7l
Affected by 0 other vulnerabilities.
0.9.8d
Affected by 56 other vulnerabilities.
VCID-rbtq-713d-aaap
Aliases:
CVE-2006-4343
VC-OPENSSL-20060928-CVE-2006-4343
A flaw in the SSLv2 client code was discovered. When a client application used OpenSSL to create an SSLv2 connection to a malicious server, that server could cause the client to crash.
0.9.7l
Affected by 0 other vulnerabilities.
0.9.8d
Affected by 56 other vulnerabilities.
VCID-vkat-mpxv-aaad
Aliases:
CVE-2006-4339
VC-OPENSSL-20060905-CVE-2006-4339
Daniel Bleichenbacher discovered an attack on PKCS #1 v1.5 signatures where under certain circumstances it may be possible for an attacker to forge a PKCS #1 v1.5 signature that would be incorrectly verified by OpenSSL.
0.9.7k
Affected by 4 other vulnerabilities.
0.9.8c
Affected by 60 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-ye43-arpb-aaab A deprecated option, SSL_OP_MISE_SSLV2_RSA_PADDING, could allow an attacker acting as a "man in the middle" to force a connection to downgrade to SSL 2.0 even if both parties support better protocols. CVE-2005-2969
VC-OPENSSL-20051011-CVE-2005-2969

Date Actor Action Vulnerability Source VulnerableCode Version
2024-01-03T20:01:48.715836+00:00 OpenSSL Importer Affected by VCID-rbtq-713d-aaap https://www.openssl.org/news/secadv/20060928.txt 34.0.0rc1
2024-01-03T20:01:48.532244+00:00 OpenSSL Importer Affected by VCID-3j45-cwzm-aaam https://www.openssl.org/news/secadv/20060928.txt 34.0.0rc1
2024-01-03T20:01:48.347435+00:00 OpenSSL Importer Affected by VCID-jpd6-6mb9-aaam https://www.openssl.org/news/secadv/20060928.txt 34.0.0rc1
2024-01-03T20:01:48.240149+00:00 OpenSSL Importer Affected by VCID-31sj-sdmb-aaaq https://www.openssl.org/news/secadv/20060928.txt 34.0.0rc1
2024-01-03T20:01:48.068027+00:00 OpenSSL Importer Affected by VCID-vkat-mpxv-aaad https://www.openssl.org/news/secadv/20060905.txt 34.0.0rc1
2024-01-03T20:01:47.919357+00:00 OpenSSL Importer Fixing VCID-ye43-arpb-aaab https://www.openssl.org/news/secadv/20051011.txt 34.0.0rc1