The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.

Project Subscriptions

Vendors Products
Webstar Subscribe
Mac Os X Subscribe
Mac Os X Server Subscribe
Converged Communications Server Subscribe
Intuity Audix Subscribe
Bluecoat Subscribe
Cacheos Ca Sa Subscribe
Proxysg Subscribe
Checkpoint Subscribe
Firewall-1 Subscribe
Provider-1 Subscribe
Access Registrar Subscribe
Application And Content Networking Software Subscribe
Call Manager Subscribe
Ciscoworks Common Management Foundation Subscribe
Ciscoworks Common Services Subscribe
Content Services Switch 11500 Subscribe
Css11000 Content Services Switch Subscribe
Css Secure Content Accelerator Subscribe
Firewall Services Module Subscribe
Gss 4480 Global Site Selector Subscribe
Gss 4490 Global Site Selector Subscribe
Mds 9000 Subscribe
Okena Stormwatch Subscribe
Pix Firewall Subscribe
Pix Firewall Software Subscribe
Secure Content Accelerator Subscribe
Threat Response Subscribe
Bsafe Ssl-j Subscribe
Freebsd Subscribe
Freebsd Subscribe
Aaa Server Subscribe
Apache-based Web Server Subscribe
Speed Technologies Litespeed Web Server Subscribe
Neoteris Subscribe
Instant Virtual Extranet Subscribe
Edirectory Subscribe
Imanager Subscribe
Openbsd Subscribe
Openbsd Subscribe
Openssl Subscribe
Openssl Subscribe
Enterprise Linux Subscribe
Enterprise Linux Desktop Subscribe
Openssl Subscribe
Stronghold Subscribe
Openserver Subscribe
Securecomputing Subscribe
Sidewinder Subscribe
Propack Subscribe
Stonesoft Subscribe
Servercluster Subscribe
Stonebeat Fullcluster Subscribe
Stonebeat Securitycluster Subscribe
Stonebeat Webcluster Subscribe
Stonegate Subscribe
Stonegate Vpn Client Subscribe
Crypto Accelerator 4000 Subscribe
Symantec Subscribe
Clientless Vpn Gateway 4400 Subscribe
Tarantella Subscribe
Tarantella Enterprise Subscribe
Gsx Server Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc cve-icon cve-icon
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc cve-icon cve-icon
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt cve-icon cve-icon
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834 cve-icon cve-icon
http://docs.info.apple.com/article.html?artnum=61798 cve-icon cve-icon
http://fedoranews.org/updates/FEDORA-2004-095.shtml cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html cve-icon cve-icon
http://lists.apple.com/mhonarc/security-announce/msg00045.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=107953412903636&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=108403806509920&w=2 cve-icon cve-icon
http://secunia.com/advisories/11139 cve-icon cve-icon
http://secunia.com/advisories/17381 cve-icon cve-icon
http://secunia.com/advisories/17398 cve-icon cve-icon
http://secunia.com/advisories/17401 cve-icon cve-icon
http://secunia.com/advisories/18247 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200403-03.xml cve-icon cve-icon
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm cve-icon cve-icon
http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US cve-icon cve-icon
http://www.ciac.org/ciac/bulletins/o-101.shtml cve-icon cve-icon
http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml cve-icon cve-icon
http://www.debian.org/security/2004/dsa-465 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/288574 cve-icon cve-icon
http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2004:023 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2004_07_openssl.html cve-icon cve-icon
http://www.openssl.org/news/secadv_20040317.txt cve-icon cve-icon
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2004-120.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2004-121.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2004-139.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2005-829.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2005-830.html cve-icon cve-icon
http://www.securityfocus.com/bid/9899 cve-icon cve-icon
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961 cve-icon cve-icon
http://www.trustix.org/errata/2004/0012 cve-icon cve-icon
http://www.uniras.gov.uk/vuls/2004/224012/index.htm cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA04-078A.html cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/15505 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2004-0079 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2004-0079 cve-icon
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.05648}

epss

{'score': 0.02058}


Thu, 16 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-01-16T17:33:22.869Z

Reserved: 2004-01-19T05:00:00.000Z

Link: CVE-2004-0079

cve-icon Vulnrichment

Updated: 2024-08-08T00:01:23.689Z

cve-icon NVD

Status : Deferred

Published: 2004-11-23T05:00:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2004-0079

cve-icon Redhat

Severity : Important

Publid Date: 2004-03-17T00:00:00Z

Links: CVE-2004-0079 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses