Vulnerability Details : CVE-2007-4995
Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2007-4995
Probability of exploitation activity in the next 30 days: 17.95%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-4995
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2007-4995
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-4995
-
Red Hat 2007-10-24This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4. An update to correct this issue for Enterprise Linux 5 is available. http://rhn.redhat.com/cve/CVE-2007-4995.html Please note that the CVE description is incorrect, this issue did not affect upstream versions of OpenSSL prior to 0.9.8.
- https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:237
-
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738962
-
http://www.redhat.com/support/errata/RHSA-2007-0964.html
Vendor Advisory
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/37185
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288
- http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
-
http://bugs.gentoo.org/show_bug.cgi?id=195634
-
http://security.gentoo.org/glsa/glsa-200710-30.xml
-
http://www.vupen.com/english/advisories/2007/3487
Vendor Advisory
-
http://www.debian.org/security/2008/dsa-1571
[SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator
- http://www.openssl.org/news/secadv_20071012.txt
-
http://www.securityfocus.com/archive/1/482167/100/0/threaded
-
http://securitytracker.com/id?1018810
-
http://www.vupen.com/english/advisories/2007/4219
Vendor Advisory
-
http://www.securityfocus.com/bid/26055
- http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
-
http://www.vupen.com/english/advisories/2008/1937/references
Vendor Advisory
-
https://usn.ubuntu.com/534-1/
- cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*