OpenSSL SSL_get_shared_ciphers Function Off-by-one Buffer Overflow
Publish Date: 21 juillet 2015
Gravité: : Medium
Identifiant(s) CVE: : CVE-2007-5135
Date du conseil: 21 juillet 2015
Description
Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.
Information Exposure Rating:
Apply associated Trend Micro DPI Rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1000826
Trend Micro Deep Security DPI Rule Name: 1000826 - OpenSSL SSL_get_shared_ciphers Function Buffer Overflow
Affected software and version:
- openssl openssl 0.9.7
- openssl openssl 0.9.7a
- openssl openssl 0.9.7b
- openssl openssl 0.9.7c
- openssl openssl 0.9.7d
- openssl openssl 0.9.7e
- openssl openssl 0.9.7f
- openssl openssl 0.9.7g
- openssl openssl 0.9.7h
- openssl openssl 0.9.7i
- openssl openssl 0.9.7j
- openssl openssl 0.9.7k
- openssl openssl 0.9.8
- openssl openssl 0.9.8a
- openssl openssl 0.9.8b
- openssl openssl 0.9.8c
- openssl openssl 0.9.8d
- openssl openssl 0.9.8e