CVE-2011-4109 : Detail

CVE-2011-4109

1.73%V4
Network
2012-01-06
00h00 +00:00
2017-08-28
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-399 Category : Resource Management Errors
Weaknesses in this category are related to improper management of system resources.

Metrics

Metrics Score Severity CVSS Vector Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Openssl>>Openssl >> Version 0.9.8

Openssl>>Openssl >> Version 0.9.8a

Openssl>>Openssl >> Version 0.9.8b

Openssl>>Openssl >> Version 0.9.8c

Openssl>>Openssl >> Version 0.9.8d

Openssl>>Openssl >> Version 0.9.8e

Openssl>>Openssl >> Version 0.9.8f

Openssl>>Openssl >> Version 0.9.8g

Openssl>>Openssl >> Version 0.9.8h

Openssl>>Openssl >> Version 0.9.8i

Openssl>>Openssl >> Version 0.9.8j

Openssl>>Openssl >> Version 0.9.8k

Openssl>>Openssl >> Version 0.9.8l

Openssl>>Openssl >> Version 0.9.8m

Openssl>>Openssl >> Version 0.9.8n

Openssl>>Openssl >> Version 0.9.8o

Openssl>>Openssl >> Version 0.9.8p

Openssl>>Openssl >> Version 0.9.8q

Openssl>>Openssl >> Version 0.9.8r

References

http://secunia.com/advisories/48528
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2012:006
Tags : vendor-advisory, x_refsource_MANDRIVA
http://rhn.redhat.com/errata/RHSA-2012-1308.html
Tags : vendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2012-1307.html
Tags : vendor-advisory, x_refsource_REDHAT
http://support.apple.com/kb/HT5784
Tags : x_refsource_CONFIRM
http://www.kb.cert.org/vuls/id/737740
Tags : third-party-advisory, x_refsource_CERT-VN
http://marc.info/?l=bugtraq&m=132750648501816&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.mandriva.com/security/advisories?name=MDVSA-2012:007
Tags : vendor-advisory, x_refsource_MANDRIVA
http://rhn.redhat.com/errata/RHSA-2012-1306.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=134039053214295&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=134039053214295&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=132750648501816&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.debian.org/security/2012/dsa-2390
Tags : vendor-advisory, x_refsource_DEBIAN