CVE-2013-0166
Published: 8 February 2013
OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
Priority
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
hardy |
Released
(0.9.8g-4ubuntu3.20)
|
lucid |
Released
(0.9.8k-7ubuntu8.14)
|
|
oneiric |
Released
(1.0.0e-2ubuntu4.7)
|
|
precise |
Released
(1.0.1-4ubuntu5.6)
|
|
quantal |
Released
(1.0.1c-3ubuntu2.1)
|
|
raring |
Released
(1.0.1c-4ubuntu4)
|
|
saucy |
Released
(1.0.1c-4ubuntu4)
|
|
trusty |
Released
(1.0.1c-4ubuntu4)
|
|
upstream |
Released
(0.9.8y, 1.0.0k, 1.0.1d)
|
|
Patches: upstream: http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=66e8211c0b1347970096e04b18aa52567c325200 upstream: http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ebc71865f0506a293242bd4aec97cdc7a8ef24b0 upstream: http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=62e4506a7d4cec1c8e1ff687f6b220f6a62a57c7 |
||
openssl098 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Released
(0.9.8o-7ubuntu3.2)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Released
(0.9.8o-7ubuntu3.2.13.10.1)
|
|
trusty |
Released
(0.9.8o-7ubuntu3.2.14.04.1)
|
|
upstream |
Released
(0.9.8y)
|