CVE-2003-0851
CVSS5.0
发布时间 :2003-12-01 00:00:00
修订时间 :2016-10-17 22:38:03
NMCOS    

[原文]OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recursion) via malformed ASN.1 sequences.


[CNNVD]多个Oracle高危险漏洞(CNNVD-200312-003)

        
        Oracle是一款大型数据库软件。
        Oracle中存在多个漏洞,影响Oracle产品的所有安全属性,可能构成本地或远程威胁。有些漏洞可能需要各种级别的认证才能利用,但也有些漏洞不需任何认证。攻击者可能利用这些漏洞完全控制受影响的数据库。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:cisco:pix_firewall:6.2.2_.111
cpe:/a:openssl:openssl:0.9.7OpenSSL Project OpenSSL 0.9.7
cpe:/o:cisco:pix_firewall:6.1%284%29
cpe:/o:cisco:pix_firewall:6.2%283%29
cpe:/o:cisco:pix_firewall:6.0%283%29
cpe:/o:cisco:pix_firewall:6.1%282%29
cpe:/o:cisco:pix_firewall:6.2%281%29
cpe:/o:cisco:pix_firewall:6.0%281%29
cpe:/a:openssl:openssl:0.9.6OpenSSL Project OpenSSL 0.9.6
cpe:/o:cisco:ios:12.2sxCisco IOS 12.2SX
cpe:/o:cisco:ios:12.2syCisco IOS 12.2SY
cpe:/a:openssl:openssl:0.9.6aOpenSSL Project OpenSSL 0.9.6a
cpe:/a:openssl:openssl:0.9.6bOpenSSL Project OpenSSL 0.9.6b
cpe:/a:cisco:css11000_content_services_switch
cpe:/o:cisco:pix_firewall:6.3%283.102%29
cpe:/o:cisco:pix_firewall:6.1%285%29
cpe:/o:cisco:pix_firewall:6.1
cpe:/o:cisco:pix_firewall:6.1%281%29
cpe:/o:cisco:pix_firewall:6.0%282%29
cpe:/o:cisco:pix_firewall:6.3%281%29
cpe:/o:cisco:pix_firewall:6.1%283%29
cpe:/o:cisco:pix_firewall:6.2%282%29
cpe:/o:cisco:pix_firewall:6.0%284%29
cpe:/a:openssl:openssl:0.9.6cOpenSSL Project OpenSSL 0.9.6c
cpe:/a:openssl:openssl:0.9.6dOpenSSL Project OpenSSL 0.9.6d
cpe:/a:openssl:openssl:0.9.6eOpenSSL Project OpenSSL 0.9.6e
cpe:/a:openssl:openssl:0.9.6fOpenSSL Project OpenSSL 0.9.6f
cpe:/o:cisco:ios:12.1%2811b%29eCisco IOS 12.1 (11b)E
cpe:/a:openssl:openssl:0.9.7aOpenSSL Project OpenSSL 0.9.7a
cpe:/a:openssl:openssl:0.9.7bOpenSSL Project OpenSSL 0.9.7b
cpe:/o:cisco:ios:12.1%2811%29eCisco IOS 12.1 (11)E
cpe:/a:openssl:openssl:0.9.6kOpenSSL Project OpenSSL 0.9.6k
cpe:/o:cisco:pix_firewall:6.0
cpe:/o:cisco:pix_firewall:6.2
cpe:/a:openssl:openssl:0.9.6gOpenSSL Project OpenSSL 0.9.6g
cpe:/o:cisco:pix_firewall:6.0%284.101%29
cpe:/a:openssl:openssl:0.9.6hOpenSSL Project OpenSSL 0.9.6h
cpe:/a:openssl:openssl:0.9.6iOpenSSL Project OpenSSL 0.9.6i
cpe:/a:openssl:openssl:0.9.6jOpenSSL Project OpenSSL 0.9.6j

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:5528OpenSSL 0.9.6k ASN.1 DoS Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0851
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0851
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200312-003
(官方数据源) CNNVD

- 其它链接及资源

ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-003.txt.asc
(UNKNOWN)  NETBSD  NetBSD-SA2004-003
ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc
(UNKNOWN)  SGI  20040304-01-U
http://marc.info/?l=bugtraq&m=106796246511667&w=2
(UNKNOWN)  BUGTRAQ  20031104 [OpenSSL Advisory] Denial of Service in ASN.1 parsing
http://marc.info/?l=bugtraq&m=108403850228012&w=2
(UNKNOWN)  BUGTRAQ  20040508 [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability
http://rhn.redhat.com/errata/RHSA-2004-119.html
(UNKNOWN)  REDHAT  RHSA-2004:119
http://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtml
(UNKNOWN)  CISCO  20030930 SSL Implementation Vulnerabilities
http://www.kb.cert.org/vuls/id/412478
(VENDOR_ADVISORY)  CERT-VN  VU#412478
http://www.openssl.org/news/secadv_20031104.txt
(VENDOR_ADVISORY)  CONFIRM  http://www.openssl.org/news/secadv_20031104.txt
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html
(UNKNOWN)  FEDORA  FEDORA-2005-1042
http://www.securityfocus.com/bid/8970
(VENDOR_ADVISORY)  BID  8970

- 漏洞信息

多个Oracle高危险漏洞
中危 输入验证
2003-12-01 00:00:00 2009-03-04 00:00:00
远程  
        
        Oracle是一款大型数据库软件。
        Oracle中存在多个漏洞,影响Oracle产品的所有安全属性,可能构成本地或远程威胁。有些漏洞可能需要各种级别的认证才能利用,但也有些漏洞不需任何认证。攻击者可能利用这些漏洞完全控制受影响的数据库。
        

- 公告与补丁

        厂商补丁:
        Oracle
        ------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        
        http://www.oracle.com/technology/deploy/security/pdf/cpuapr2005.pdf

- 漏洞信息

2765
OpenSSL ASN.1 Large Recursion DoS
Local Access Required, Remote / Network Access Denial of Service, Input Manipulation
Loss of Availability
Exploit Public Vendor Verified

- 漏洞描述

There is a flaw in OpenSSL running on Windows that can be used to make OpenSSL crash causing a Denial of Service. The flaw is in the way that OpenSSL handles ASN.1 tags. A remote attacker can cause OpenSSL to enter a large recursion by sending a specifically crafted certificate.

- 时间线

2003-11-04 Unknow
Unknow Unknow

- 解决方案

Upgrade to version OpenSSL 0.9.6l, OpenSSL 0.9.7c or later, or apply the vendor-supplied patch. You must then recompile any applications that were compiled statically with OpenSSL.

- 相关参考

- 漏洞作者

- 漏洞信息

OpenSSL ASN.1 Large Recursion Remote Denial Of Service Vulnerability
Input Validation Error 8970
Yes No
2003-11-04 12:00:00 2009-07-12 12:56:00
Discovery credited to Novell.

- 受影响的程序版本

SGI IRIX 6.5.21 m
SGI IRIX 6.5.21 f
SGI IRIX 6.5.20 m
SGI IRIX 6.5.20 f
SGI IRIX 6.5.19 m
SGI IRIX 6.5.19 f
RedHat Linux 8.0
RedHat Linux 7.3
RedHat Linux 7.2
Opera Software Opera Web Browser 7.22
Opera Software Opera Web Browser 7.21
Opera Software Opera Web Browser 7.20
OpenSSL Project OpenSSL 0.9.7 b
+ OpenPKG OpenPKG 1.3
OpenSSL Project OpenSSL 0.9.7 a
+ Conectiva Linux 9.0
+ OpenPKG OpenPKG Current
OpenSSL Project OpenSSL 0.9.7
+ Caldera OpenUnix 8.0
+ Caldera UnixWare 7.1.3
+ Caldera UnixWare 7.1.1
+ FreeBSD FreeBSD 5.0
+ OpenBSD OpenBSD 3.2
+ OpenPKG OpenPKG 1.2
OpenSSL Project OpenSSL 0.9.6 k
+ Blue Coat Systems CacheOS CA/SA 4.1.10
+ Blue Coat Systems Security Gateway OS 3.1
+ Blue Coat Systems Security Gateway OS 3.0
+ Blue Coat Systems Security Gateway OS 2.1.5001 SP1
+ Blue Coat Systems Security Gateway OS 2.1.9
+ Blue Coat Systems Security Gateway OS 2.0
+ Slackware Linux 8.1
OpenSSL Project OpenSSL 0.9.6 j
OpenSSL Project OpenSSL 0.9.6 i
+ HP Apache-Based Web Server 1.3.27 .01
+ HP Apache-Based Web Server 1.3.27 .00
+ HP HP-UX Apache-Based Web Server 1.0.1 .01
+ HP HP-UX Apache-Based Web Server 1.0 .07.01
+ HP HP-UX Apache-Based Web Server 1.0 .06.02
+ HP HP-UX Apache-Based Web Server 1.0 .06.01
+ HP HP-UX Apache-Based Web Server 1.0 .05.01
+ HP HP-UX Apache-Based Web Server 1.0 .04.01
+ HP HP-UX Apache-Based Web Server 1.0 .03.01
+ HP HP-UX Apache-Based Web Server 1.0 .02.01
+ HP HP-UX Apache-Based Web Server 1.0 .01
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Mandriva Linux Mandrake 9.0
+ S.u.S.E. Linux Personal 8.2
OpenSSL Project OpenSSL 0.9.6 h
OpenSSL Project OpenSSL 0.9.6 g
+ Conectiva Linux Enterprise Edition 1.0
+ FreeBSD FreeBSD 4.7 -RELEASE
+ FreeBSD FreeBSD 4.7
+ HP Apache-Based Web Server 2.0.43 .04
+ HP Apache-Based Web Server 2.0.43 .00
+ HP Webmin-Based Admin 1.0 .01
+ Immunix Immunix OS 7+
+ NetBSD NetBSD 1.6
+ OpenPKG OpenPKG 1.1
OpenSSL Project OpenSSL 0.9.6 f
OpenSSL Project OpenSSL 0.9.6 e
+ FreeBSD FreeBSD 4.6 -RELEASE
+ FreeBSD FreeBSD 4.6
OpenSSL Project OpenSSL 0.9.6 d
+ Slackware Linux 8.1
OpenSSL Project OpenSSL 0.9.6 c
+ Conectiva Linux 8.0
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Mandriva Linux Mandrake 8.2
+ S.u.S.E. Linux 8.0 i386
+ S.u.S.E. Linux 8.0
OpenSSL Project OpenSSL 0.9.6 b
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
+ OpenBSD OpenBSD 3.1
+ OpenBSD OpenBSD 3.0
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i686
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2
+ RedHat Linux Advanced Work Station 2.1
+ S.u.S.E. Linux 7.3 sparc
+ S.u.S.E. Linux 7.3 ppc
+ S.u.S.E. Linux 7.3 i386
+ S.u.S.E. Linux Connectivity Server
+ S.u.S.E. Linux Database Server 0
+ S.u.S.E. Linux Firewall on CD
+ S.u.S.E. Office Server
+ S.u.S.E. SuSE eMail Server III
+ Sun Linux 5.0.7
+ Sun Linux 5.0.6
+ Sun Linux 5.0.5
+ Sun Linux 5.0.3
+ Sun Linux 5.0
+ SuSE SUSE Linux Enterprise Server 7
OpenSSL Project OpenSSL 0.9.6 a
+ Conectiva Linux 7.0
+ NetBSD NetBSD 1.5.3
+ NetBSD NetBSD 1.5.2
+ NetBSD NetBSD 1.5.1
+ NetBSD NetBSD 1.5
+ S.u.S.E. Linux 7.2 i386
+ S.u.S.E. Linux 7.1 sparc
+ S.u.S.E. Linux 7.1 ppc
+ S.u.S.E. Linux 7.1 alpha
+ S.u.S.E. Linux 7.1
OpenSSL Project OpenSSL 0.9.6
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1.1
+ Caldera OpenLinux Workstation 3.1
+ Conectiva Linux 6.0
+ EnGarde Secure Linux 1.0.1
+ HP Secure OS software for Linux 1.0
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
+ NetBSD NetBSD 1.6 beta
+ NetBSD NetBSD 1.6
+ NetBSD NetBSD 1.5.3
+ NetBSD NetBSD 1.5.2
+ NetBSD NetBSD 1.5.1
+ NetBSD NetBSD 1.5
+ OpenBSD OpenBSD 2.9
+ OpenPKG OpenPKG 1.0
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.0 sparc
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ Trustix Secure Linux 1.5
+ Trustix Secure Linux 1.2
+ Trustix Secure Linux 1.1
OpenSSL Project OpenSSL 0.9.5 a
+ Debian Linux 3.0
+ HP Secure OS software for Linux 1.0
+ Immunix Immunix OS 7.0
+ Immunix Immunix OS 6.2
+ MandrakeSoft Corporate Server 1.0.1
+ MandrakeSoft Single Network Firewall 7.2
+ Mandriva Linux Mandrake 7.2
+ Mandriva Linux Mandrake 7.1
+ OpenBSD OpenBSD 2.8
+ OpenBSD OpenBSD 2.7
+ Red Hat Linux 6.2
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i686
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.2
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.1
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ RedHat Linux 7.0
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
+ S.u.S.E. Linux 7.0 sparc
+ S.u.S.E. Linux 7.0 ppc
+ S.u.S.E. Linux 7.0 i386
+ S.u.S.E. Linux 7.0 alpha
OpenSSL Project OpenSSL 0.9.5
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
OpenSSL Project OpenSSL 0.9.4
+ Debian Linux 3.0
+ OpenBSD OpenBSD 2.6
OpenSSL Project OpenSSL 0.9.3
OpenSSL Project OpenSSL 0.9.2 b
OpenSSL Project OpenSSL 0.9.1 c
NetBSD NetBSD 1.6.1
NetBSD NetBSD 1.6
Cisco PIX Firewall 6.3 (1)
Cisco PIX Firewall 6.2.2 .111
Cisco PIX Firewall 6.2.2
Cisco PIX Firewall 6.2.1
Cisco PIX Firewall 6.2 (3)
Cisco PIX Firewall 6.2 (2)
Cisco PIX Firewall 6.2 (1)
Cisco PIX Firewall 6.2
Cisco PIX Firewall 6.1.4
Cisco PIX Firewall 6.1.3
Cisco PIX Firewall 6.1 (5)
Cisco PIX Firewall 6.1 (4)
Cisco PIX Firewall 6.1 (3)
Cisco PIX Firewall 6.1 (2)
Cisco PIX Firewall 6.1 (1)
Cisco PIX Firewall 6.1
+ Cisco PIX Firewall 515
+ Cisco PIX Firewall 520
Cisco PIX Firewall 6.0.4
Cisco PIX Firewall 6.0.3
Cisco PIX Firewall 6.0 (4.101)
Cisco PIX Firewall 6.0 (4)
Cisco PIX Firewall 6.0 (2)
Cisco PIX Firewall 6.0 (1)
Cisco PIX Firewall 6.0
+ Cisco PIX Firewall 515
+ Cisco PIX Firewall 520
Cisco IOS 12.2SY
Cisco IOS 12.2SX
Cisco IOS 12.1(11b)E12
Cisco IOS 12.1(11b)E
Cisco IOS 12.1(11)EC
Cisco IOS 12.1(11)EA1
Cisco IOS 12.1(11)E
Cisco Firewall Services Module (FWSM) 2.1 (0.208)
Cisco CSS11000 Content Services Switch
Opera Software Opera Web Browser 7.23
OpenSSL Project OpenSSL 0.9.7 c
+ OpenPKG OpenPKG 2.0
+ Slackware Linux 9.1
+ Slackware Linux 9.0
+ Slackware Linux -current
OpenSSL Project OpenSSL 0.9.6 l
Blue Coat Systems Security Gateway OS 3.1.2
Blue Coat Systems Security Gateway OS 2.1.10
Blue Coat Systems CacheOS CA/SA 4.1.12

- 不受影响的程序版本

Opera Software Opera Web Browser 7.23
OpenSSL Project OpenSSL 0.9.7 c
+ OpenPKG OpenPKG 2.0
+ Slackware Linux 9.1
+ Slackware Linux 9.0
+ Slackware Linux -current
OpenSSL Project OpenSSL 0.9.6 l
Blue Coat Systems Security Gateway OS 3.1.2
Blue Coat Systems Security Gateway OS 2.1.10
Blue Coat Systems CacheOS CA/SA 4.1.12

- 漏洞讨论

A problem has been identified in OpenSSL when handling specific types of ASN.1 requests. This may result in remote attackers creating a denial of service condition.

This issue is also known to affect numerous Cisco products. It is possible that other vendors will also be acknowledging this issue and providing fixes.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Fixes have been made available by the vendor.

Opera have released a new version of their Internet browser; this version 7.23 includes a patch to address this vulnerability. See attached changelog for further detail.

Cisco has released a revision of their SSL Implementation Vulnerabilities advisory (ID:45643) to include information about products that are affected by this vulnerability and workaround/fix information, additionally Cisco have released software availability dates. Please see the attached advisory for further details about which products are vulnerable and how to obtain fixes. This BID will be updated as Cisco provides more complete information about affected products and fixes.

Guardian Digitial has released security advisory ESA-20031104-029 to address this issue. Affected users are advised to run the webtool to update systems.

BlueCoat Systems has released an advisory stating that it has identified the vulnerability in versions of SGOS prior to 3.1.2 and 2.1.10, as well as CA/SA prior to 4.1.12. Fixed versions are currently in development.

SGI has also released an advisory 20030904-02-P that includes patches which address this issue.

NetBSD has released an advisory that includes updates. Fix details may be found in the attached advisory.

Red Hat advisory RHSA-2004:119-04 was also released for Red Hat Linux Enterprise releases. Please see the attached advisory for further details. Enterprise fixes may be obtained through the Red Hat Network.

RedHat has released an advisory RHSA-2004:139-05 to address this and other issues. Please see the advisory in web references for more information.

RedHat has released Fedora advisory FEDORA-2004-095 dealing with the issues and others. Please see the advisory section for more details.

RedHat has released an advisory RHSA-2004:119-04 to address this and other issues. Please see the advisory in web references for more information.

Fedora advisory FEDORA-2005-1042 is available to address this and other issues in Fedora Core 3. Please see the referenced advisory for more information.


OpenSSL Project OpenSSL 0.9.1 c

OpenSSL Project OpenSSL 0.9.2 b

OpenSSL Project OpenSSL 0.9.3

OpenSSL Project OpenSSL 0.9.4

OpenSSL Project OpenSSL 0.9.5 a

OpenSSL Project OpenSSL 0.9.5

OpenSSL Project OpenSSL 0.9.6 j

OpenSSL Project OpenSSL 0.9.6 d

OpenSSL Project OpenSSL 0.9.6 c

OpenSSL Project OpenSSL 0.9.6 e

OpenSSL Project OpenSSL 0.9.6 h

OpenSSL Project OpenSSL 0.9.6 a

OpenSSL Project OpenSSL 0.9.6 f

OpenSSL Project OpenSSL 0.9.6

OpenSSL Project OpenSSL 0.9.6 b

OpenSSL Project OpenSSL 0.9.6 g

OpenSSL Project OpenSSL 0.9.6 k

OpenSSL Project OpenSSL 0.9.6 i

OpenSSL Project OpenSSL 0.9.7 a

OpenSSL Project OpenSSL 0.9.7 b

SGI IRIX 6.5.19 m

SGI IRIX 6.5.19 f

SGI IRIX 6.5.20 f

SGI IRIX 6.5.20 m

SGI IRIX 6.5.21 m

SGI IRIX 6.5.21 f

Opera Software Opera Web Browser 7.20

Opera Software Opera Web Browser 7.21

Opera Software Opera Web Browser 7.22

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站