CVE DATABASE / CVE-2004-0112
CVE-2004-0112
CVSS 5 · MEDIUM
Summary
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
CVSS 2.0 breakdown
| Base score | 5 (MEDIUM) |
| Vector | AV:N/AC:L/Au:N/C:N/I:N/A:P |
| Attack vector | NETWORK |
| Attack complexity | LOW |
| Confidentiality | NONE |
| Integrity | NONE |
| Availability | PARTIAL |
Weakness type (CWE)
Affected products
Cisco firewall services moduleHp aaa serverHp apache-based web serverSymantec clientless vpn gateway 4400Cisco ciscoworks common management foundationCisco ciscoworks common servicesAvaya converged communications serverAvaya sg200Avaya sg203Avaya sg208Avaya sg5Apple mac os xApple mac os x serverFreebsd freebsdHp hp-uxOpenbsd openbsdRedhat enterprise linuxRedhat enterprise linux desktopRedhat linuxSco openserver
Check this CVE live
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834
- http://docs.info.apple.com/article.html?artnum=61798
- http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
- http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
- http://lists.apple.com/mhonarc/security-announce/msg00045.html
- http://marc.info/?l=bugtraq&m=107953412903636&w=2
- http://marc.info/?l=bugtraq&m=108403806509920&w=2
- http://secunia.com/advisories/11139
- http://security.gentoo.org/glsa/glsa-200403-03.xml
- http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524
- http://www.ciac.org/ciac/bulletins/o-101.shtml
- http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml
- http://www.kb.cert.org/vuls/id/484726
Data: NIST NVD. NVD last modified 2026-04-16. Always verify against the vendor advisory before acting.