CVE-2006-7250
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/02/2012
Last modified:
11/04/2025
Description
The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 0.9.8t (including) | |
| cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://cvs.openssl.org/chngview?cn=22144
- http://marc.info/?l=bugtraq&m=133728068926468&w=2
- http://marc.info/?l=bugtraq&m=133728068926468&w=2
- http://marc.info/?l=openssl-dev&m=115685408414194&w=2
- http://secunia.com/advisories/36533
- http://secunia.com/advisories/48153
- http://secunia.com/advisories/48516
- http://secunia.com/advisories/48899
- http://www.mail-archive.com/openssl-dev%40openssl.org/msg30305.html
- http://www.openwall.com/lists/oss-security/2012/02/27/10
- http://www.openwall.com/lists/oss-security/2012/02/28/14
- http://www.redhat.com/support/errata/RHSA-2009-1335.html
- http://www.securityfocus.com/bid/52181
- http://www.ubuntu.com/usn/USN-1424-1
- https://bugzilla.novell.com/show_bug.cgi?id=748738
- https://bugzilla.redhat.com/show_bug.cgi?id=798100
- http://cvs.openssl.org/chngview?cn=22144
- http://marc.info/?l=bugtraq&m=133728068926468&w=2
- http://marc.info/?l=bugtraq&m=133728068926468&w=2
- http://marc.info/?l=openssl-dev&m=115685408414194&w=2
- http://secunia.com/advisories/36533
- http://secunia.com/advisories/48153
- http://secunia.com/advisories/48516
- http://secunia.com/advisories/48899
- http://www.mail-archive.com/openssl-dev%40openssl.org/msg30305.html
- http://www.openwall.com/lists/oss-security/2012/02/27/10
- http://www.openwall.com/lists/oss-security/2012/02/28/14
- http://www.redhat.com/support/errata/RHSA-2009-1335.html
- http://www.securityfocus.com/bid/52181
- http://www.ubuntu.com/usn/USN-1424-1
- https://bugzilla.novell.com/show_bug.cgi?id=748738
- https://bugzilla.redhat.com/show_bug.cgi?id=798100



