Bug 321191 (CVE-2007-4995) - CVE-2007-4995 openssl dtls out of order vulnerabilitiy
Summary: CVE-2007-4995 openssl dtls out of order vulnerabilitiy
Alias: CVE-2007-4995
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Tomas Mraz
QA Contact:
Depends On: 321211 321221
TreeView+ depends on / blocked
Reported: 2007-10-06 08:10 UTC by Mark J. Cox
Modified: 2019-09-29 12:21 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2008-01-16 17:45:58 UTC

Attachments (Terms of Use)
draft advisory (1.17 KB, text/plain)
2007-10-06 08:10 UTC, Mark J. Cox
no flags Details
proposed patch (40.37 KB, patch)
2007-10-06 08:11 UTC, Mark J. Cox
no flags Details | Diff

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0964 0 normal SHIPPED_LIVE Important: openssl security update 2007-10-12 14:22:50 UTC

Description Mark J. Cox 2007-10-06 08:10:36 UTC
The OpenSSL team reported a flaw in OpenSSL DTLS support (introduced in OpenSSL
0.9.8) that could potentially lead to arbitrary code execution.

This will only affect OpenSSL with Red Hat Enterprise Linux 5, not earlier
versions.  We don't ship any client or server that uses DTLS by default.

We need to investigate the technical nature of the flaw to determine if the flaw
is captured by the various technologies in OpenSSL.  

Currently embargoed, public date not yet set.

Comment 1 Mark J. Cox 2007-10-06 08:10:36 UTC
Created attachment 218291 [details]
draft advisory

Comment 2 Mark J. Cox 2007-10-06 08:11:13 UTC
Created attachment 218311 [details]
proposed patch

Comment 6 Mark J. Cox 2007-10-12 10:57:17 UTC
now public, removing embargo

Comment 7 Red Hat Product Security 2008-01-16 17:45:58 UTC
This issue was addressed in:

Red Hat Enterprise Linux:


Note You need to log in before you can comment on or make changes to this bug.