Description
OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2621-1 | openssl security update |
EUVD |
EUVD-2013-0205 | OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key. |
Ubuntu USN |
USN-1732-1 | OpenSSL vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T14:18:09.381Z
Reserved: 2012-12-06T00:00:00.000Z
Link: CVE-2013-0166
No data.
Status : Deferred
Published: 2013-02-08T19:55:00.967
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-0166
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN