Public Date:
908052: CVE-2013-0166 openssl: DoS due to improper handling of OCSP response verification

The MITRE CVE dictionary describes this issue as:

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

Find out more about CVE-2013-0166 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5
Base Metrics AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat JBoss Web Platform 5.2 RHSA-2013:0782 2013-05-01
Red Hat JBoss Web Server 2.0 RHSA-2013:1013 2013-07-03
Red Hat JBoss Enterprise Application Platform 6.1 RHSA-2013:0833 2013-05-20
Red Hat Enterprise Linux 6 (openssl) RHSA-2013:0587 2013-03-04
Red Hat Enterprise Linux 5 (openssl) RHSA-2013:0587 2013-03-04
Red Hat JBoss Enterprise Application Platform 5.2 RHSA-2013:0783 2013-05-01
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) RHSA-2013:0636 2013-03-13

Affected Packages State

Platform Package State
Red Hat JBoss EWS 1 openssl Will not fix
Red Hat Enterprise Linux 6 openssl098e Will not fix
Red Hat Enterprise Linux 5 openssl097a Will not fix


External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation