{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2007-09-27T00:00:00.000Z","descriptions":[{"lang":"en","value":"Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.  NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.  As of 20071012, it is unknown whether code execution is possible."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-15T20:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"https://bugs.gentoo.org/show_bug.cgi?id=194039"},{"name":"HPSBUX02292","tags":["vendor-advisory","x_refsource_HP"],"url":"http://www.securityfocus.com/archive/1/484353/100/0/threaded"},{"name":"oval:org.mitre.oval:def:5337","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5337"},{"name":"20071001 Re: OpenSSL SSL_get_shared_ciphers() off-by-one buffer overflow","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/481217/100/0/threaded"},{"tags":["x_refsource_CONFIRM"],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0241"},{"name":"27205","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27205"},{"name":"27097","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27097"},{"name":"ADV-2008-2362","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2362"},{"name":"1018755","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1018755"},{"name":"31489","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31489"},{"name":"APPLE-SA-2008-07-31","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"},{"name":"FEDORA-2007-725","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html"},{"name":"RHSA-2007:1003","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2007-1003.html"},{"name":"29242","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/29242"},{"name":"MDKSA-2007:193","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:193"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.rpath.com/browse/RPL-1770"},{"name":"27186","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27186"},{"name":"27851","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27851"},{"name":"ADV-2008-2268","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2268"},{"name":"30124","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30124"},{"name":"SUSE-SR:2008:005","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"},{"name":"27394","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27394"},{"name":"[4.1] 011: SECURITY FIX: October 10, 2007","tags":["vendor-advisory","x_refsource_OPENBSD"],"url":"http://www.openbsd.org/errata41.html"},{"name":"20071004 Re: OpenSSL SSL_get_shared_ciphers() off-by-one buffer overflow","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/481506/100/0/threaded"},{"name":"oval:org.mitre.oval:def:10904","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10904"},{"name":"20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/485936/100/0/threaded"},{"name":"31308","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31308"},{"name":"22130","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22130"},{"name":"27031","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27031"},{"name":"[Security-announce] 20080107 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages","tags":["mailing-list","x_refsource_MLIST"],"url":"http://lists.vmware.com/pipermail/security-announce/2008/000002.html"},{"name":"ADV-2007-3625","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/3625"},{"name":"20070927 OpenSSL SSL_get_shared_ciphers() off-by-one buffer overflow","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/480855/100/0/threaded"},{"name":"FreeBSD-SA-07:08","tags":["vendor-advisory","x_refsource_FREEBSD"],"url":"http://security.freebsd.org/advisories/FreeBSD-SA-07:08.openssl.asc"},{"name":"USN-522-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/522-1/"},{"name":"ADV-2008-2361","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2361"},{"name":"27217","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27217"},{"name":"31467","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31467"},{"name":"27961","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27961"},{"name":"RHSA-2007:0964","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0964.html"},{"name":"27870","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27870"},{"name":"25831","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/25831"},{"name":"DSA-1379","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2007/dsa-1379"},{"name":"ADV-2007-4042","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/4042"},{"name":"20071003 FLEA-2007-0058-1 openssl openssl-scripts","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/481488/100/0/threaded"},{"name":"27330","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27330"},{"tags":["x_refsource_CONFIRM"],"url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4038"},{"name":"30161","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30161"},{"name":"GLSA-200805-07","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"},{"tags":["x_refsource_CONFIRM"],"url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4037"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0013.html"},{"name":"28368","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/28368"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.rpath.com/browse/RPL-1769"},{"name":"27012","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27012"},{"name":"3179","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/3179"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-485.htm"},{"name":"27229","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27229"},{"name":"27051","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27051"},{"name":"31326","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31326"},{"name":"27078","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27078"},{"name":"GLSA-200710-06","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-200710-06.xml"},{"name":"SSRT071499","tags":["vendor-advisory","x_refsource_HP"],"url":"http://www.securityfocus.com/archive/1/484353/100/0/threaded"},{"name":"NetBSD-SA2008-007","tags":["vendor-advisory","x_refsource_NETBSD"],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.openssl.org/news/secadv_20071012.txt"},{"name":"200858","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200858-1"},{"name":"[4.0] 017: SECURITY FIX: October 10, 2007","tags":["vendor-advisory","x_refsource_OPENBSD"],"url":"http://www.openbsd.org/errata40.html"},{"name":"[4.2] 002: SECURITY FIX: October 10, 2007","tags":["vendor-advisory","x_refsource_OPENBSD"],"url":"http://www.openbsd.org/errata42.html"},{"name":"openssl-sslgetshared-bo(36837)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/36837"},{"name":"RHSA-2007:0813","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0813.html"},{"name":"SUSE-SR:2007:020","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2007_20_sr.html"},{"name":"ADV-2007-3325","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/3325"},{"name":"ADV-2007-4144","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/4144"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0001.html"},{"name":"ADV-2008-0064","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/0064"},{"name":"27021","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27021"},{"name":"103130","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103130-1"},{"name":"20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/486859/100/0/threaded"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2007-5135","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.  NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.  As of 20071012, it is unknown whether code execution is possible."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://bugs.gentoo.org/show_bug.cgi?id=194039","refsource":"MISC","url":"https://bugs.gentoo.org/show_bug.cgi?id=194039"},{"name":"HPSBUX02292","refsource":"HP","url":"http://www.securityfocus.com/archive/1/484353/100/0/threaded"},{"name":"oval:org.mitre.oval:def:5337","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5337"},{"name":"20071001 Re: OpenSSL SSL_get_shared_ciphers() off-by-one buffer overflow","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/481217/100/0/threaded"},{"name":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0241","refsource":"CONFIRM","url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0241"},{"name":"27205","refsource":"SECUNIA","url":"http://secunia.com/advisories/27205"},{"name":"27097","refsource":"SECUNIA","url":"http://secunia.com/advisories/27097"},{"name":"ADV-2008-2362","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2362"},{"name":"1018755","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1018755"},{"name":"31489","refsource":"SECUNIA","url":"http://secunia.com/advisories/31489"},{"name":"APPLE-SA-2008-07-31","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"},{"name":"FEDORA-2007-725","refsource":"FEDORA","url":"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html"},{"name":"RHSA-2007:1003","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2007-1003.html"},{"name":"29242","refsource":"SECUNIA","url":"http://secunia.com/advisories/29242"},{"name":"MDKSA-2007:193","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:193"},{"name":"https://issues.rpath.com/browse/RPL-1770","refsource":"CONFIRM","url":"https://issues.rpath.com/browse/RPL-1770"},{"name":"27186","refsource":"SECUNIA","url":"http://secunia.com/advisories/27186"},{"name":"27851","refsource":"SECUNIA","url":"http://secunia.com/advisories/27851"},{"name":"ADV-2008-2268","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2268"},{"name":"30124","refsource":"SECUNIA","url":"http://secunia.com/advisories/30124"},{"name":"SUSE-SR:2008:005","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"},{"name":"27394","refsource":"SECUNIA","url":"http://secunia.com/advisories/27394"},{"name":"[4.1] 011: SECURITY FIX: October 10, 2007","refsource":"OPENBSD","url":"http://www.openbsd.org/errata41.html"},{"name":"20071004 Re: OpenSSL SSL_get_shared_ciphers() off-by-one buffer overflow","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/481506/100/0/threaded"},{"name":"oval:org.mitre.oval:def:10904","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10904"},{"name":"20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/485936/100/0/threaded"},{"name":"31308","refsource":"SECUNIA","url":"http://secunia.com/advisories/31308"},{"name":"22130","refsource":"SECUNIA","url":"http://secunia.com/advisories/22130"},{"name":"27031","refsource":"SECUNIA","url":"http://secunia.com/advisories/27031"},{"name":"[Security-announce] 20080107 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages","refsource":"MLIST","url":"http://lists.vmware.com/pipermail/security-announce/2008/000002.html"},{"name":"ADV-2007-3625","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/3625"},{"name":"20070927 OpenSSL SSL_get_shared_ciphers() off-by-one buffer overflow","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/480855/100/0/threaded"},{"name":"FreeBSD-SA-07:08","refsource":"FREEBSD","url":"http://security.freebsd.org/advisories/FreeBSD-SA-07:08.openssl.asc"},{"name":"USN-522-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/522-1/"},{"name":"ADV-2008-2361","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2361"},{"name":"27217","refsource":"SECUNIA","url":"http://secunia.com/advisories/27217"},{"name":"31467","refsource":"SECUNIA","url":"http://secunia.com/advisories/31467"},{"name":"27961","refsource":"SECUNIA","url":"http://secunia.com/advisories/27961"},{"name":"RHSA-2007:0964","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2007-0964.html"},{"name":"27870","refsource":"SECUNIA","url":"http://secunia.com/advisories/27870"},{"name":"25831","refsource":"BID","url":"http://www.securityfocus.com/bid/25831"},{"name":"DSA-1379","refsource":"DEBIAN","url":"http://www.debian.org/security/2007/dsa-1379"},{"name":"ADV-2007-4042","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/4042"},{"name":"20071003 FLEA-2007-0058-1 openssl openssl-scripts","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/481488/100/0/threaded"},{"name":"27330","refsource":"SECUNIA","url":"http://secunia.com/advisories/27330"},{"name":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4038","refsource":"CONFIRM","url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4038"},{"name":"30161","refsource":"SECUNIA","url":"http://secunia.com/advisories/30161"},{"name":"GLSA-200805-07","refsource":"GENTOO","url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"},{"name":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4037","refsource":"CONFIRM","url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4037"},{"name":"http://www.vmware.com/security/advisories/VMSA-2008-0013.html","refsource":"CONFIRM","url":"http://www.vmware.com/security/advisories/VMSA-2008-0013.html"},{"name":"28368","refsource":"SECUNIA","url":"http://secunia.com/advisories/28368"},{"name":"https://issues.rpath.com/browse/RPL-1769","refsource":"CONFIRM","url":"https://issues.rpath.com/browse/RPL-1769"},{"name":"27012","refsource":"SECUNIA","url":"http://secunia.com/advisories/27012"},{"name":"3179","refsource":"SREASON","url":"http://securityreason.com/securityalert/3179"},{"name":"http://support.avaya.com/elmodocs2/security/ASA-2007-485.htm","refsource":"CONFIRM","url":"http://support.avaya.com/elmodocs2/security/ASA-2007-485.htm"},{"name":"27229","refsource":"SECUNIA","url":"http://secunia.com/advisories/27229"},{"name":"27051","refsource":"SECUNIA","url":"http://secunia.com/advisories/27051"},{"name":"31326","refsource":"SECUNIA","url":"http://secunia.com/advisories/31326"},{"name":"27078","refsource":"SECUNIA","url":"http://secunia.com/advisories/27078"},{"name":"GLSA-200710-06","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-200710-06.xml"},{"name":"SSRT071499","refsource":"HP","url":"http://www.securityfocus.com/archive/1/484353/100/0/threaded"},{"name":"NetBSD-SA2008-007","refsource":"NETBSD","url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc"},{"name":"http://www.openssl.org/news/secadv_20071012.txt","refsource":"CONFIRM","url":"http://www.openssl.org/news/secadv_20071012.txt"},{"name":"200858","refsource":"SUNALERT","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200858-1"},{"name":"[4.0] 017: SECURITY FIX: October 10, 2007","refsource":"OPENBSD","url":"http://www.openbsd.org/errata40.html"},{"name":"[4.2] 002: SECURITY FIX: October 10, 2007","refsource":"OPENBSD","url":"http://www.openbsd.org/errata42.html"},{"name":"openssl-sslgetshared-bo(36837)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/36837"},{"name":"RHSA-2007:0813","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2007-0813.html"},{"name":"SUSE-SR:2007:020","refsource":"SUSE","url":"http://www.novell.com/linux/security/advisories/2007_20_sr.html"},{"name":"ADV-2007-3325","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/3325"},{"name":"ADV-2007-4144","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/4144"},{"name":"http://www.vmware.com/security/advisories/VMSA-2008-0001.html","refsource":"CONFIRM","url":"http://www.vmware.com/security/advisories/VMSA-2008-0001.html"},{"name":"ADV-2008-0064","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/0064"},{"name":"27021","refsource":"SECUNIA","url":"http://secunia.com/advisories/27021"},{"name":"103130","refsource":"SUNALERT","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103130-1"},{"name":"20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/486859/100/0/threaded"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T15:17:28.340Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugs.gentoo.org/show_bug.cgi?id=194039"},{"name":"HPSBUX02292","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://www.securityfocus.com/archive/1/484353/100/0/threaded"},{"name":"oval:org.mitre.oval:def:5337","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5337"},{"name":"20071001 Re: OpenSSL SSL_get_shared_ciphers() off-by-one buffer overflow","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/481217/100/0/threaded"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0241"},{"name":"27205","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27205"},{"name":"27097","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27097"},{"name":"ADV-2008-2362","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2362"},{"name":"1018755","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1018755"},{"name":"31489","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31489"},{"name":"APPLE-SA-2008-07-31","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"},{"name":"FEDORA-2007-725","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html"},{"name":"RHSA-2007:1003","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2007-1003.html"},{"name":"29242","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/29242"},{"name":"MDKSA-2007:193","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:193"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.rpath.com/browse/RPL-1770"},{"name":"27186","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27186"},{"name":"27851","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27851"},{"name":"ADV-2008-2268","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2268"},{"name":"30124","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30124"},{"name":"SUSE-SR:2008:005","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"},{"name":"27394","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27394"},{"name":"[4.1] 011: SECURITY FIX: October 10, 2007","tags":["vendor-advisory","x_refsource_OPENBSD","x_transferred"],"url":"http://www.openbsd.org/errata41.html"},{"name":"20071004 Re: OpenSSL SSL_get_shared_ciphers() off-by-one buffer overflow","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/481506/100/0/threaded"},{"name":"oval:org.mitre.oval:def:10904","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10904"},{"name":"20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/485936/100/0/threaded"},{"name":"31308","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31308"},{"name":"22130","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22130"},{"name":"27031","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27031"},{"name":"[Security-announce] 20080107 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://lists.vmware.com/pipermail/security-announce/2008/000002.html"},{"name":"ADV-2007-3625","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/3625"},{"name":"20070927 OpenSSL SSL_get_shared_ciphers() off-by-one buffer overflow","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/480855/100/0/threaded"},{"name":"FreeBSD-SA-07:08","tags":["vendor-advisory","x_refsource_FREEBSD","x_transferred"],"url":"http://security.freebsd.org/advisories/FreeBSD-SA-07:08.openssl.asc"},{"name":"USN-522-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/522-1/"},{"name":"ADV-2008-2361","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2361"},{"name":"27217","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27217"},{"name":"31467","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31467"},{"name":"27961","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27961"},{"name":"RHSA-2007:0964","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0964.html"},{"name":"27870","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27870"},{"name":"25831","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/25831"},{"name":"DSA-1379","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2007/dsa-1379"},{"name":"ADV-2007-4042","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/4042"},{"name":"20071003 FLEA-2007-0058-1 openssl openssl-scripts","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/481488/100/0/threaded"},{"name":"27330","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27330"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4038"},{"name":"30161","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30161"},{"name":"GLSA-200805-07","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4037"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0013.html"},{"name":"28368","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/28368"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.rpath.com/browse/RPL-1769"},{"name":"27012","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27012"},{"name":"3179","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/3179"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-485.htm"},{"name":"27229","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27229"},{"name":"27051","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27051"},{"name":"31326","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31326"},{"name":"27078","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27078"},{"name":"GLSA-200710-06","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-200710-06.xml"},{"name":"SSRT071499","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://www.securityfocus.com/archive/1/484353/100/0/threaded"},{"name":"NetBSD-SA2008-007","tags":["vendor-advisory","x_refsource_NETBSD","x_transferred"],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.openssl.org/news/secadv_20071012.txt"},{"name":"200858","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200858-1"},{"name":"[4.0] 017: SECURITY FIX: October 10, 2007","tags":["vendor-advisory","x_refsource_OPENBSD","x_transferred"],"url":"http://www.openbsd.org/errata40.html"},{"name":"[4.2] 002: SECURITY FIX: October 10, 2007","tags":["vendor-advisory","x_refsource_OPENBSD","x_transferred"],"url":"http://www.openbsd.org/errata42.html"},{"name":"openssl-sslgetshared-bo(36837)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/36837"},{"name":"RHSA-2007:0813","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0813.html"},{"name":"SUSE-SR:2007:020","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2007_20_sr.html"},{"name":"ADV-2007-3325","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/3325"},{"name":"ADV-2007-4144","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/4144"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0001.html"},{"name":"ADV-2008-0064","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/0064"},{"name":"27021","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27021"},{"name":"103130","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103130-1"},{"name":"20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/486859/100/0/threaded"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2007-5135","datePublished":"2007-09-27T20:00:00.000Z","dateReserved":"2007-09-27T00:00:00.000Z","dateUpdated":"2024-08-07T15:17:28.340Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}