High severity7.5NVD Advisory· Published Nov 23, 2004· Updated Apr 16, 2026
CVE-2004-0079
CVE-2004-0079
Description
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Affected products
244cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:firewall_services_module:1.1_\(3.005\):*:*:*:*:*:*:*
- cpe:2.3:h:cisco:firewall_services_module:2.1_\(0.208\):*:*:*:*:*:*:*
- cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*
cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*
- cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*
- cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*
- cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*
cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*+ 15 more
- cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*+ 4 more
- cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*
- cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*
- cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*
- cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*
- cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*+ 2 more
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:12.1\(11\)e:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:o:cisco:ios:12.1\(11\)e:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.1\(11b\)e:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.1\(11b\)e12:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.1\(11b\)e14:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.1\(13\)e9:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.1\(19\)e1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.2\(14\)sy:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.2\(14\)sy1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*+ 3 more
- cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*
- cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*
cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*+ 4 more
- cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*
- cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*
- cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*
cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:vpn-1:next_generation_fp2:*:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*
cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*
cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*+ 13 more
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*
cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*+ 21 more
- cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.1\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.1\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.1\(3\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.1\(4\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.1\(5\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.2\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.2\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.2\(3\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.2\(3.100\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.3\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.3\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.3\(3.102\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.3\(3.109\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.0\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.0\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.0\(3\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.0\(4\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.0\(4.101\):*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*+ 17 more
- cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*
- cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*
- cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*
cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*
cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*
- cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*
- cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*
- cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*
- cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*
- cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*
- cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*
- cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*
cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*
- cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
45- fedoranews.org/updates/FEDORA-2004-095.shtmlnvdThird Party Advisory
- security.gentoo.org/glsa/glsa-200403-03.xmlnvdThird Party Advisory
- support.avaya.com/elmodocs2/security/ASA-2005-239.htmnvdThird Party Advisory
- www.debian.org/security/2004/dsa-465nvdThird Party Advisory
- www.kb.cert.org/vuls/id/288574nvdThird Party AdvisoryUS Government Resource
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.openssl.org/news/secadv_20040317.txtnvdThird Party Advisory
- www.securityfocus.com/bid/9899nvdBroken LinkThird Party AdvisoryVDB EntryVendor Advisory
- www.us-cert.gov/cas/techalerts/TA04-078A.htmlnvdBroken LinkThird Party AdvisoryUS Government Resource
- exchange.xforce.ibmcloud.com/vulnerabilities/15505nvdThird Party AdvisoryVDB Entry
- ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.ascnvdBroken Link
- ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.ascnvdBroken Link
- ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txtnvdBroken Link
- distro.conectiva.com.br/atualizacoes/nvdBroken Link
- docs.info.apple.com/article.htmlnvdBroken Link
- lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlnvdMailing List
- lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlnvdMailing List
- lists.apple.com/mhonarc/security-announce/msg00045.htmlnvdBroken Link
- marc.infonvdMailing List
- marc.infonvdMailing List
- secunia.com/advisories/11139nvdBroken Link
- secunia.com/advisories/17381nvdBroken Link
- secunia.com/advisories/17398nvdBroken Link
- secunia.com/advisories/17401nvdBroken Link
- secunia.com/advisories/18247nvdBroken Link
- sunsolve.sun.com/pub-cgi/retrieve.plnvdBroken Link
- support.lexmark.com/indexnvdBroken Link
- www.ciac.org/ciac/bulletins/o-101.shtmlnvdBroken Link
- www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtmlnvdBroken Link
- www.linuxsecurity.com/advisories/engarde_advisory-4135.htmlnvdBroken Link
- www.novell.com/linux/security/advisories/2004_07_openssl.htmlnvdBroken Link
- www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.htmlnvdMailing List
- www.redhat.com/support/errata/RHSA-2004-120.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2004-121.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2004-139.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2005-829.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2005-830.htmlnvdBroken Link
- www.slackware.org/security/viewer.phpnvdBroken Link
- www.trustix.org/errata/2004/0012nvdBroken Link
- www.uniras.gov.uk/vuls/2004/224012/index.htmnvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621nvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770nvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870nvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975nvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779nvdBroken Link
News mentions
0No linked articles in our index yet.