{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2012-01-04T00:00:00.000Z","descriptions":[{"lang":"en","value":"Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-08-28T12:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"48528","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/48528"},{"name":"MDVSA-2012:006","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:006"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.openssl.org/news/secadv_20120104.txt"},{"name":"SUSE-SU-2012:0084","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html"},{"name":"RHSA-2012:1308","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2012-1308.html"},{"name":"RHSA-2012:1307","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2012-1307.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.apple.com/kb/HT5784"},{"name":"APPLE-SA-2013-06-04-1","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"},{"name":"VU#737740","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/737740"},{"name":"HPSBUX02734","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=132750648501816&w=2"},{"name":"openssl-policy-checks-dos(72129)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/72129"},{"name":"MDVSA-2012:007","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:007"},{"name":"RHSA-2012:1306","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2012-1306.html"},{"name":"HPSBOV02793","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=134039053214295&w=2"},{"name":"SSRT100891","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=134039053214295&w=2"},{"name":"SSRT100729","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=132750648501816&w=2"},{"name":"DSA-2390","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2012/dsa-2390"},{"tags":["x_refsource_CONFIRM"],"url":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T00:01:50.478Z"},"title":"CVE Program Container","references":[{"name":"48528","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/48528"},{"name":"MDVSA-2012:006","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:006"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.openssl.org/news/secadv_20120104.txt"},{"name":"SUSE-SU-2012:0084","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html"},{"name":"RHSA-2012:1308","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-1308.html"},{"name":"RHSA-2012:1307","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-1307.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.apple.com/kb/HT5784"},{"name":"APPLE-SA-2013-06-04-1","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"},{"name":"VU#737740","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/737740"},{"name":"HPSBUX02734","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=132750648501816&w=2"},{"name":"openssl-policy-checks-dos(72129)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/72129"},{"name":"MDVSA-2012:007","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:007"},{"name":"RHSA-2012:1306","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-1306.html"},{"name":"HPSBOV02793","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=134039053214295&w=2"},{"name":"SSRT100891","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=134039053214295&w=2"},{"name":"SSRT100729","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=132750648501816&w=2"},{"name":"DSA-2390","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2012/dsa-2390"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2011-4109","datePublished":"2012-01-06T01:00:00.000Z","dateReserved":"2011-10-18T00:00:00.000Z","dateUpdated":"2024-08-07T00:01:50.478Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}