CVE-2004-0081

OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
References
Link Resource
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt
ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834
http://fedoranews.org/updates/FEDORA-2004-095.shtml
http://marc.info/?l=bugtraq&m=107955049331965&w=2
http://marc.info/?l=bugtraq&m=108403850228012&w=2
http://rhn.redhat.com/errata/RHSA-2004-119.html
http://secunia.com/advisories/11139
http://security.gentoo.org/glsa/glsa-200403-03.xml
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524
http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml
http://www.debian.org/security/2004/dsa-465
http://www.kb.cert.org/vuls/id/465542 Third Party Advisory US Government Resource
http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html
http://www.redhat.com/support/errata/RHSA-2004-120.html
http://www.redhat.com/support/errata/RHSA-2004-121.html
http://www.redhat.com/support/errata/RHSA-2004-139.html
http://www.securityfocus.com/bid/9899 Vendor Advisory
http://www.trustix.org/errata/2004/0012
http://www.uniras.gov.uk/vuls/2004/224012/index.htm
http://www.us-cert.gov/cas/techalerts/TA04-078A.html US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/15509
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt
ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834
http://fedoranews.org/updates/FEDORA-2004-095.shtml
http://marc.info/?l=bugtraq&m=107955049331965&w=2
http://marc.info/?l=bugtraq&m=108403850228012&w=2
http://rhn.redhat.com/errata/RHSA-2004-119.html
http://secunia.com/advisories/11139
http://security.gentoo.org/glsa/glsa-200403-03.xml
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524
http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml
http://www.debian.org/security/2004/dsa-465
http://www.kb.cert.org/vuls/id/465542 Third Party Advisory US Government Resource
http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html
http://www.redhat.com/support/errata/RHSA-2004-120.html
http://www.redhat.com/support/errata/RHSA-2004-121.html
http://www.redhat.com/support/errata/RHSA-2004-139.html
http://www.securityfocus.com/bid/9899 Vendor Advisory
http://www.trustix.org/errata/2004/0012
http://www.uniras.gov.uk/vuls/2004/224012/index.htm
http://www.us-cert.gov/cas/techalerts/TA04-078A.html US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/15509
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firewall_services_module:1.1_\(3.005\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:firewall_services_module:2.1_\(0.208\):*:*:*:*:*:*:*
cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*
cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*
cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*
cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*
cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*
cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:cisco:ios:12.1\(11\)e:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1\(11b\)e:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1\(11b\)e12:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1\(11b\)e14:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1\(13\)e9:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1\(19\)e1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.2\(14\)sy:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.2\(14\)sy1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*
OR cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*
cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*
cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*
cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*
cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*
cpe:2.3:a:checkpoint:vpn-1:next_generation:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*
cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*
cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*
cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*
cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*
cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*
cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*
cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*
cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*
cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*
cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*
cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*
cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*
cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*
cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*
cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*
cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*
cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*
cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*
cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*
cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*
cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*
cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*
cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(3\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(4\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(4.101\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1\(3\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1\(4\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1\(5\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.2\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.2\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.2\(3\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.2\(3.100\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.3\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.3\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.3\(3.102\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.3\(3.109\):*:*:*:*:*:*:*

History

20 Nov 2024, 23:47

Type Values Removed Values Added
References () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt - () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt -
References () ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc - () ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc -
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834 -
References () http://fedoranews.org/updates/FEDORA-2004-095.shtml - () http://fedoranews.org/updates/FEDORA-2004-095.shtml -
References () http://marc.info/?l=bugtraq&m=107955049331965&w=2 - () http://marc.info/?l=bugtraq&m=107955049331965&w=2 -
References () http://marc.info/?l=bugtraq&m=108403850228012&w=2 - () http://marc.info/?l=bugtraq&m=108403850228012&w=2 -
References () http://rhn.redhat.com/errata/RHSA-2004-119.html - () http://rhn.redhat.com/errata/RHSA-2004-119.html -
References () http://secunia.com/advisories/11139 - () http://secunia.com/advisories/11139 -
References () http://security.gentoo.org/glsa/glsa-200403-03.xml - () http://security.gentoo.org/glsa/glsa-200403-03.xml -
References () http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524 - () http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524 -
References () http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml - () http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml -
References () http://www.debian.org/security/2004/dsa-465 - () http://www.debian.org/security/2004/dsa-465 -
References () http://www.kb.cert.org/vuls/id/465542 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/465542 - Third Party Advisory, US Government Resource
References () http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html - () http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html -
References () http://www.redhat.com/support/errata/RHSA-2004-120.html - () http://www.redhat.com/support/errata/RHSA-2004-120.html -
References () http://www.redhat.com/support/errata/RHSA-2004-121.html - () http://www.redhat.com/support/errata/RHSA-2004-121.html -
References () http://www.redhat.com/support/errata/RHSA-2004-139.html - () http://www.redhat.com/support/errata/RHSA-2004-139.html -
References () http://www.securityfocus.com/bid/9899 - Vendor Advisory () http://www.securityfocus.com/bid/9899 - Vendor Advisory
References () http://www.trustix.org/errata/2004/0012 - () http://www.trustix.org/errata/2004/0012 -
References () http://www.uniras.gov.uk/vuls/2004/224012/index.htm - () http://www.uniras.gov.uk/vuls/2004/224012/index.htm -
References () http://www.us-cert.gov/cas/techalerts/TA04-078A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA04-078A.html - US Government Resource
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15509 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/15509 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902 -

08 Nov 2021, 15:48

Type Values Removed Values Added
CPE cpe:2.3:a:rsa:bsafe_ssl-j_sdk:3.0:*:*:*:*:*:*:*
cpe:2.3:a:rsa:bsafe_ssl-j_sdk:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rsa:bsafe_ssl-j_sdk:3.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*

Information

Published : 2004-11-23 05:00

Updated : 2024-11-20 23:47


NVD link : CVE-2004-0081

Mitre link : CVE-2004-0081

CVE.ORG link : CVE-2004-0081


JSON object : View

Products Affected

redhat

  • linux
  • enterprise_linux
  • openssl
  • enterprise_linux_desktop

cisco

  • okena_stormwatch
  • css11000_content_services_switch
  • application_and_content_networking_software
  • secure_content_accelerator
  • css_secure_content_accelerator
  • pix_firewall_software
  • firewall_services_module
  • ios
  • mds_9000
  • pix_firewall
  • webns
  • gss_4480_global_site_selector
  • content_services_switch_11500
  • call_manager
  • ciscoworks_common_services
  • access_registrar
  • gss_4490_global_site_selector
  • ciscoworks_common_management_foundation
  • threat_response

checkpoint

  • firewall-1
  • provider-1
  • vpn-1

novell

  • imanager
  • edirectory

avaya

  • intuity_audix
  • s8700
  • sg208
  • vsu
  • s8500
  • sg5
  • converged_communications_server
  • sg200
  • s8300
  • sg203

vmware

  • gsx_server

hp

  • aaa_server
  • apache-based_web_server
  • hp-ux
  • wbem

apple

  • mac_os_x
  • mac_os_x_server

freebsd

  • freebsd

dell

  • bsafe_ssl-j

stonesoft

  • stonebeat_securitycluster
  • servercluster
  • stonebeat_webcluster
  • stonegate_vpn_client
  • stonebeat_fullcluster
  • stonegate

symantec

  • clientless_vpn_gateway_4400

4d

  • webstar

lite

  • speed_technologies_litespeed_web_server

openssl

  • openssl

sgi

  • propack

bluecoat

  • proxysg
  • cacheos_ca_sa

neoteris

  • instant_virtual_extranet

securecomputing

  • sidewinder

openbsd

  • openbsd

sun

  • crypto_accelerator_4000

sco

  • openserver

tarantella

  • tarantella_enterprise