CVE-2003-0544

NameCVE-2003-0544
DescriptionOpenSSL 0.9.6 and 0.9.7 does not properly track the number of characters in certain ASN.1 inputs, which allows remote attackers to cause a denial of service (crash) via an SSL client certificate that causes OpenSSL to read past the end of a buffer when the long form is used.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-393, DSA-394
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssl (PTS)wheezy1.0.1e-2+deb7u20fixed
wheezy (security)1.0.1t-1+deb7u1fixed
jessie1.0.1t-1+deb8u3fixed
jessie (security)1.0.1t-1+deb8u5fixed
stretch, sid1.1.0c-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensslsource(unstable)0.9.7cmedium
opensslsourcewoody0.9.6c-2.woody.4mediumDSA-393
openssl095sourcewoody0.9.5a-6.woody.3mediumDSA-394
openssl096source(unstable)0.9.6kmedium

Search for package or bug name: Reporting problems