CVE-2010-0742
Summary
| CVE | CVE-2010-0742 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2010-06-03 14:30:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Openssl | Openssl | 0.9.1c | All | All | All |
| Application | Openssl | Openssl | 0.9.2b | All | All | All |
| Application | Openssl | Openssl | 0.9.3 | All | All | All |
| Application | Openssl | Openssl | 0.9.3a | All | All | All |
| Application | Openssl | Openssl | 0.9.4 | All | All | All |
| Application | Openssl | Openssl | 0.9.5 | All | All | All |
| Application | Openssl | Openssl | 0.9.5 | beta1 | All | All |
| Application | Openssl | Openssl | 0.9.5 | beta2 | All | All |
| Application | Openssl | Openssl | 0.9.5a | All | All | All |
| Application | Openssl | Openssl | 0.9.5a | beta1 | All | All |
| Application | Openssl | Openssl | 0.9.5a | beta2 | All | All |
| Application | Openssl | Openssl | 0.9.6 | All | All | All |
| Application | Openssl | Openssl | 0.9.6 | beta1 | All | All |
| Application | Openssl | Openssl | 0.9.6 | beta2 | All | All |
| Application | Openssl | Openssl | 0.9.6 | beta3 | All | All |
| Application | Openssl | Openssl | 0.9.6a | All | All | All |
| Application | Openssl | Openssl | 0.9.6a | beta1 | All | All |
| Application | Openssl | Openssl | 0.9.6a | beta2 | All | All |
| Application | Openssl | Openssl | 0.9.6a | beta3 | All | All |
| Application | Openssl | Openssl | 0.9.6b | All | All | All |
| Application | Openssl | Openssl | 0.9.6c | All | All | All |
| Application | Openssl | Openssl | 0.9.6d | All | All | All |
| Application | Openssl | Openssl | 0.9.6e | All | All | All |
| Application | Openssl | Openssl | 0.9.6f | All | All | All |
| Application | Openssl | Openssl | 0.9.6g | All | All | All |
| Application | Openssl | Openssl | 0.9.6h | All | All | All |
| Application | Openssl | Openssl | 0.9.6i | All | All | All |
| Application | Openssl | Openssl | 0.9.6j | All | All | All |
| Application | Openssl | Openssl | 0.9.6k | All | All | All |
| Application | Openssl | Openssl | 0.9.6l | All | All | All |
| Application | Openssl | Openssl | 0.9.6m | All | All | All |
| Application | Openssl | Openssl | 0.9.7 | All | All | All |
| Application | Openssl | Openssl | 0.9.7 | beta1 | All | All |
| Application | Openssl | Openssl | 0.9.7 | beta2 | All | All |
| Application | Openssl | Openssl | 0.9.7 | beta3 | All | All |
| Application | Openssl | Openssl | 0.9.7 | beta4 | All | All |
| Application | Openssl | Openssl | 0.9.7 | beta5 | All | All |
| Application | Openssl | Openssl | 0.9.7 | beta6 | All | All |
| Application | Openssl | Openssl | 0.9.7a | All | All | All |
| Application | Openssl | Openssl | 0.9.7b | All | All | All |
| Application | Openssl | Openssl | 0.9.7c | All | All | All |
| Application | Openssl | Openssl | 0.9.7d | All | All | All |
| Application | Openssl | Openssl | 0.9.7e | All | All | All |
| Application | Openssl | Openssl | 0.9.7f | All | All | All |
| Application | Openssl | Openssl | 0.9.7g | All | All | All |
| Application | Openssl | Openssl | 0.9.7h | All | All | All |
| Application | Openssl | Openssl | 0.9.7i | All | All | All |
| Application | Openssl | Openssl | 0.9.7j | All | All | All |
| Application | Openssl | Openssl | 0.9.7k | All | All | All |
| Application | Openssl | Openssl | 0.9.7l | All | All | All |
| Application | Openssl | Openssl | 0.9.7m | All | All | All |
| Application | Openssl | Openssl | 0.9.8 | All | All | All |
| Application | Openssl | Openssl | 0.9.8a | All | All | All |
| Application | Openssl | Openssl | 0.9.8b | All | All | All |
| Application | Openssl | Openssl | 0.9.8c | All | All | All |
| Application | Openssl | Openssl | 0.9.8d | All | All | All |
| Application | Openssl | Openssl | 0.9.8e | All | All | All |
| Application | Openssl | Openssl | 0.9.8f | All | All | All |
| Application | Openssl | Openssl | 0.9.8g | All | All | All |
| Application | Openssl | Openssl | 0.9.8h | All | All | All |
| Application | Openssl | Openssl | 0.9.8i | All | All | All |
| Application | Openssl | Openssl | 0.9.8j | All | All | All |
| Application | Openssl | Openssl | 0.9.8k | All | All | All |
| Application | Openssl | Openssl | 0.9.8l | All | All | All |
| Application | Openssl | Openssl | 0.9.8m | All | All | All |
| Application | Openssl | Openssl | 1.0.0 | All | All | All |
| Application | Openssl | Openssl | 1.0.0 | beta1 | All | All |
| Application | Openssl | Openssl | 1.0.0 | beta2 | All | All |
| Application | Openssl | Openssl | 1.0.0 | beta3 | All | All |
| Application | Openssl | Openssl | 1.0.0 | beta4 | All | All |
| Application | Openssl | Openssl | 1.0.0 | beta5 | All | All |
| Application | Openssl | Openssl | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Patch, Vendor Advisory |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| www.openssl.org/news/secadv_20100601.txt | af854a3a-2127-422b-91ae-364da2661108 | www.openssl.org | |
| kb.bluecoat.com/index | af854a3a-2127-422b-91ae-364da2661108 | kb.bluecoat.com | |
| About Secunia Research | Flexera | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Webmail - OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| [syslog-ng-announce] syslog-ng Premium Edition 3.0.6a has been released | af854a3a-2127-422b-91ae-364da2661108 | lists.balabit.com | |
| #2211: Segfault running 'openssl cms -decrypt', version 1.0.0 | af854a3a-2127-422b-91ae-364da2661108 | rt.openssl.org | |
| Security Advisory SA57353 - IBM Storage System DS8870 OpenSSL Multiple Vulnerabilities - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| IBM Security Bulletin: Storage HMC OpenSSL upgrade to address cryptographic vulnerabilities. - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | |
| Bug 598738 – CVE-2010-0742 openssl: invalid ASN1 module definition for CMS | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | |
| About Secunia Research | Flexera | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| OpenSSL Cryptographic Message Syntax Memory Corruption Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| cvs.openssl.org/filediff | af854a3a-2127-422b-91ae-364da2661108 | cvs.openssl.org | |
| cvs.openssl.org/chngview | af854a3a-2127-422b-91ae-364da2661108 | cvs.openssl.org | |
| Security Advisory SA42457 - HP-UX update for OpenSSL - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| OpenSSL Two Vulnerabilities - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [syslog-ng-announce] syslog-ng Premium Edition 3.2.1a has been released | af854a3a-2127-422b-91ae-364da2661108 | lists.balabit.com | |
| OpenSSL Cryptographic Message Syntax "OriginatorInfo" Vulnerability - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| '[security bulletin] HPSBUX02610 SSRT100341 rev.1 - HP-UX Running OpenSSL, Remote Execution of Arbitr' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 390284 Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2023-0013)