Severity: : Critical
  CVE Kennungen: : CVE-2006-3738
  Advisory Date: 21 de lipca de 2015

  DESCRIPTION

Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL has unspecified impact and remote attack vectors involving a long list of ciphers. Note: The detection logic for a DPI rule is same for both vulnerabilities CVE-2006-3738 & CVE-2007-5135 due to same vulnerable condition. Hence you may see over recommendation of this vulnerability when there is no patch detected for vulnerability CVE-2007-5135.

  INFORMATION EXPOSURE

Failed exploit attempts may crash applications, denying service to legitimate users.

  SOLUTION

  Trend Micro Deep Security DPI Rule Number: 1000826
  Trend Micro Deep Security DPI Rule Name: 1000826 - OpenSSL SSL_get_shared_ciphers Function Buffer Overflow

  AFFECTED SOFTWARE AND VERSION:

  • OpenSSL Project OpenSSL 0.9.7
  • OpenSSL Project OpenSSL 0.9.7a
  • OpenSSL Project OpenSSL 0.9.7b
  • OpenSSL Project OpenSSL 0.9.7c
  • OpenSSL Project OpenSSL 0.9.7d
  • OpenSSL Project OpenSSL 0.9.7e
  • OpenSSL Project OpenSSL 0.9.7f
  • OpenSSL Project OpenSSL 0.9.7g
  • OpenSSL Project OpenSSL 0.9.7h
  • OpenSSL Project OpenSSL 0.9.7i
  • OpenSSL Project OpenSSL 0.9.7j
  • OpenSSL Project OpenSSL 0.9.7k
  • OpenSSL Project OpenSSL 0.9.8
  • OpenSSL Project OpenSSL 0.9.8a
  • OpenSSL Project OpenSSL 0.9.8b
  • OpenSSL Project OpenSSL 0.9.8c