crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openssl | Openssl | 1.0.0 (including) | 1.0.0 (including) |
Openssl | Openssl | 1.0.0-beta1 (including) | 1.0.0-beta1 (including) |
Openssl | Openssl | 1.0.0-beta2 (including) | 1.0.0-beta2 (including) |
Openssl | Openssl | 1.0.0-beta3 (including) | 1.0.0-beta3 (including) |
Openssl | Openssl | 1.0.0-beta4 (including) | 1.0.0-beta4 (including) |
Openssl | Openssl | 1.0.0-beta5 (including) | 1.0.0-beta5 (including) |
Openssl | Openssl | 1.0.0a (including) | 1.0.0a (including) |
Openssl | Openssl | 1.0.0b (including) | 1.0.0b (including) |
Openssl | Openssl | 1.0.0c (including) | 1.0.0c (including) |
Openssl | Openssl | 1.0.0d (including) | 1.0.0d (including) |
Openssl | Ubuntu | upstream | * |
Red Hat Enterprise Linux 6 | RedHat | openssl-0:1.0.0-10.el6_1.5 | * |