Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote malicious users to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openssl openssl 0.9.7 |
||
openssl openssl 0.9.7g |
||
openssl openssl 0.9.7h |
||
openssl openssl 0.9.8c |
||
openssl openssl 0.9.8d |
||
openssl openssl 0.9.7a |
||
openssl openssl 0.9.7b |
||
openssl openssl 0.9.7i |
||
openssl openssl 0.9.7j |
||
openssl openssl 0.9.8e |
||
openssl openssl 0.9.7l |
||
openssl openssl 0.9.7e |
||
openssl openssl 0.9.7f |
||
openssl openssl 0.9.8a |
||
openssl openssl 0.9.8b |
||
openssl openssl 0.9.7c |
||
openssl openssl 0.9.7d |
||
openssl openssl 0.9.7k |
||
openssl openssl 0.9.8 |
||
openssl openssl 0.9.8f |