5
CVSSv2

CVE-2003-0544

Published: 17/11/2003 Updated: 03/05/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

OpenSSL 0.9.6 and 0.9.7 does not properly track the number of characters in certain ASN.1 inputs, which allows remote malicious users to cause a denial of service (crash) via an SSL client certificate that causes OpenSSL to read past the end of a buffer when the long form is used.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.6

openssl openssl 0.9.7

Vendor Advisories

Dr Stephen Henson (steve@opensslorg), using a test suite provided by NISCC (wwwnisccgovuk/), discovered a number of errors in the OpenSSL ASN1 code Combined with an error that causes the OpenSSL code to parse client certificates even when it should not, these errors can cause a denial of service (DoS) condition on a system using the Op ...
Steve Henson of the OpenSSL core team identified and prepared fixes for a number of vulnerabilities in the OpenSSL ASN1 code that were discovered after running a test suite by British National Infrastructure Security Coordination Centre (NISCC) A bug in OpenSSLs SSL/TLS protocol was also identified which causes OpenSSL to parse a client certificat ...
On September 30, 2003, new vulnerabilities in the OpenSSL implementation for SSL were announced This is referred to as the "first" vulnerability in this document On November 4, 2003, another vulnerability in the OpenSSL implementation for SSL, version 096, was announced This is referred to as the "second" vulnerability in this ...