{"api_version":"1","generated_at":"2026-04-22T23:30:55+00:00","cve":"CVE-2006-3738","urls":{"html":"https://cve.report/CVE-2006-3738","api":"https://cve.report/api/cve/CVE-2006-3738.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-3738","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-3738"},"summary":{"title":"CVE-2006-3738","description":"Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2006-09-28 18:07:00","updated_at":"2018-10-17 21:29:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256","name":"oval:org.mitre.oval:def:4256","refsource":"OVAL","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22216","name":"22216","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"Kolab Server Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22626","name":"22626","refsource":"SECUNIA","tags":[],"title":"SnapGear Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23155","name":"23155","refsource":"SECUNIA","tags":[],"title":"Mac OS X Security Update Fixes Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22799","name":"22799","refsource":"SECUNIA","tags":[],"title":"Cisco Products OpenSSL Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/26329","name":"26329","refsource":"SECUNIA","tags":[],"title":"HP System Management Homepage Apache and OpenSSL Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22165","name":"22165","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"FreeBSD update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22186","name":"22186","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"Red Hat update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22130","name":"22130","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"OpenSSL Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946","name":"SSA:2006-272-01","refsource":"SLACKWARE","tags":["Patch"],"title":"The Slackware Linux Project: Slackware Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22500","name":"22500","refsource":"SECUNIA","tags":[],"title":"Debian update for openssl096 - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.trustix.org/errata/2006/0054","name":"2006-0054","refsource":"TRUSTIX","tags":["Patch"],"title":"","mime":"text/plain","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html","name":"http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html","refsource":"CONFIRM","tags":[],"title":"VMware ESX Server 2.5.3 Upgrade Patch 6 (for 2.5.3 Systems)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/20249","name":"20249","refsource":"BID","tags":["Patch"],"title":"OpenSSL SSL_Get_Shared_Ciphers Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/22487","name":"22487","refsource":"SECUNIA","tags":[],"title":"SGI Advanced Linux Environment Multiple Updates - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25889","name":"25889","refsource":"SECUNIA","tags":[],"title":"Xerox ESS/ Network Controller OpenSSL Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.us-cert.gov/cas/techalerts/TA06-333A.html","name":"TA06-333A","refsource":"CERT","tags":["US Government Resource"],"title":"US-CERT Technical Cyber Security Alert TA06-333A -- Apple Releases Security Update to Address Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22298","name":"22298","refsource":"SECUNIA","tags":[],"title":"SUSE updates for openssh, openssl, and bind9 - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016943","name":"1016943","refsource":"SECTRACK","tags":["Patch"],"title":"SecurityTracker.com Archives - OpenSSL ASN.1 Bugs, SSL_get_shared_ciphers() Buffer Overflow, and SSLv2 Client Error Lets Remote Users Denial of Service or Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2008-0629.html","name":"RHSA-2008:0629","refsource":"REDHAT","tags":[],"title":"Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22284","name":"22284","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"Serv-U FTP Server OpenSSL Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/4314","name":"ADV-2006-4314","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html","name":"http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html","refsource":"CONFIRM","tags":[],"title":"VMware ESX Server 2.1.3 Upgrade Patch 4 (for 2.1.3 Systems)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227","name":"http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227","refsource":"CONFIRM","tags":[],"title":"SourceForge.net: SysAdmin Tools from ITeF!x: Files","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0695.html","name":"RHSA-2006:0695","refsource":"REDHAT","tags":["Patch"],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23794","name":"23794","refsource":"SECUNIA","tags":[],"title":"Oracle Products Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2006/dsa-1185","name":"DSA-1185","refsource":"DEBIAN","tags":["Patch"],"title":"Debian -- Security Information -- DSA-1185-2 openssl","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/3869","name":"ADV-2006-3869","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html","name":"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html","refsource":"CONFIRM","tags":[],"title":"Download Patch ESX-9986131 for VMware ESX Server 3.0.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23680","name":"23680","refsource":"SECUNIA","tags":[],"title":"VMWare ESX Server Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/30124","name":"30124","refsource":"SECUNIA","tags":[],"title":"NetBSD update for OpenSSL - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22460","name":"22460","refsource":"SECUNIA","tags":[],"title":"Sun Grid Engine Multiple OpenSSL Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/3902","name":"ADV-2006-3902","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/0343","name":"ADV-2007-0343","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.serv-u.com/releasenotes/","name":"http://www.serv-u.com/releasenotes/","refsource":"CONFIRM","tags":[],"title":"Serv-U Release Notes - Current","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22172","name":"22172","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"SUSE update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2006_24_sr.html","name":"SUSE-SR:2006:024","refsource":"SUSE","tags":["Patch","Vendor Advisory"],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml","name":"20061108 Multiple Vulnerabilities in OpenSSL library","refsource":"CISCO","tags":[],"title":"Cisco - Networking, Cloud, and Cybersecurity Solutions","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/24930","name":"24930","refsource":"SECUNIA","tags":[],"title":"HP Tru64 UNIX Multiple SSL and BIND Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/447318/100/0/threaded","name":"20060928 rPSA-2006-0175-1 openssl openssl-scripts","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html","name":"APPLE-SA-2006-11-28","refsource":"APPLE","tags":[],"title":"APPLE-SA-2006-11-28 Security Update 2006-007","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/447393/100/0/threaded","name":"20060929 rPSA-2006-0175-2 openssl openssl-scripts","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22330","name":"22330","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"OpenBSD update for OpenSSL - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/4401","name":"ADV-2006-4401","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html","name":"http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html","refsource":"CONFIRM","tags":[],"title":"Oracle Critical Patch Update - January 2007","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html","name":"http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html","refsource":"CONFIRM","tags":[],"title":"VMware ESX Server 2.5.4 Upgrade Patch 3 (for 2.5.4 Systems Only)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc","name":"FreeBSD-SA-06:23","refsource":"FREEBSD","tags":["Patch","Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22212","name":"22212","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"Mandriva update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1","name":"102668","refsource":"SUNALERT","tags":["Patch"],"title":"#102668: Security Vulnerabilities In OpenSSL Affect Sun Grid Engine 5.3 and N1 Grid Engine 6.0","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://securitytracker.com/id?1017522","name":"1017522","refsource":"SECTRACK","tags":[],"title":"SecurityTracker.com Archives - Oracle Database and Other Products Have 52 Unspecified Vulnerabilities With Unspecified Impact","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22220","name":"22220","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"rPath update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=130497311408250&w=2","name":"SSRT090208","refsource":"HP","tags":[],"title":"'[security bulletin] HPSBOV02683 SSRT090208 rev.1 - HP Secure Web Server (SWS) for OpenVMS running Ap' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370","name":"oval:org.mitre.oval:def:9370","refsource":"OVAL","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540","name":"SSRT071299","refsource":"HP","tags":[],"title":"IT Resource Center - login / register","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:177","name":"MDKSA-2006:177","refsource":"MANDRIVA","tags":[],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc","name":"20061001-01-P","refsource":"SGI","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771","name":"HPSBMA02250","refsource":"HP","tags":[],"title":"HPSBMA02250 SSRT061275 rev.1 - HP System Management Homepage (SMH) for Linux and Windows, Remote Execution of Arbitrary Code and Denial of Service (DoS) - c01118771 - \r\n\t\tHP Business Support Center","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml","name":"GLSA-200805-07","refsource":"GENTOO","tags":[],"title":"Linux Terminal Server Project: Multiple vulnerabilities — Gentoo Linux Documentation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/3936","name":"ADV-2006-3936","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://issues.rpath.com/browse/RPL-613","name":"http://issues.rpath.com/browse/RPL-613","refsource":"CONFIRM","tags":[],"title":"[#RPL-613] openssl vulnerabilities including remote unauthorized access: CVE-2006-2937 CVE-2006-2940 CVE-2006-3738 CVE-2006-4343 - rPath JIRA","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/usn-353-1","name":"USN-353-1","refsource":"UBUNTU","tags":["Patch"],"title":"usn/usn-353-1 - Ubuntu: Linux for human beings","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openssl.org/news/secadv_20060928.txt","name":"http://www.openssl.org/news/secadv_20060928.txt","refsource":"CONFIRM","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2006_58_openssl.html","name":"SUSE-SA:2006:058","refsource":"SUSE","tags":["Patch","Vendor Advisory"],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/547300","name":"VU#547300","refsource":"CERT-VN","tags":["US Government Resource"],"title":"US-CERT Vulnerability Note VU#547300","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/1401","name":"ADV-2007-1401","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22166","name":"22166","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"Ubuntu update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:178","name":"MDKSA-2006:178","refsource":"MANDRIVA","tags":[],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23038","name":"23038","refsource":"SECUNIA","tags":[],"title":"IBM HMC OpenSSH / OpenSSL Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22259","name":"22259","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"Mandriva update for ntp - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html","name":"OpenPKG-SA-2006.021","refsource":"OPENPKG","tags":["Patch","Vendor Advisory"],"title":"OpenPKG Corporation: Security: Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22240","name":"22240","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"Debian update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html","name":"20061108 Multiple Vulnerabilities in OpenSSL Library","refsource":"CISCO","tags":[],"title":"Cisco Security Response: Multiple Vulnerabilities in OpenSSL Library  [Cisco GSS 4400 Series Global Site Selector Appliances] - Cisco Systems","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://openvpn.net/changelog.html","name":"http://openvpn.net/changelog.html","refsource":"CONFIRM","tags":["Patch"],"title":"OpenVPN 2.0.x Change Log","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/3860","name":"ADV-2006-3860","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22654","name":"22654","refsource":"SECUNIA","tags":[],"title":"Nortel Communication Server OpenSSL Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/2315","name":"ADV-2007-2315","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/470460/100/0/threaded","name":"20070602 Recent OpenSSL exploits","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22758","name":"22758","refsource":"SECUNIA","tags":[],"title":"Cisco Products OpenSSL Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22193","name":"22193","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"rPath update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm","name":"http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm","refsource":"CONFIRM","tags":[],"title":"ASA-2006-260 HP-UX OpenSSL Denial of Service (DoS), Increase Privilige (HPSBUX02174)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/24950","name":"24950","refsource":"SECUNIA","tags":[],"title":"HP Insight Management Agents SSL Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22633","name":"22633","refsource":"SECUNIA","tags":[],"title":"Nortel Products OpenSSL Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/4264","name":"ADV-2006-4264","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/4417","name":"ADV-2006-4417","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/29262","name":"29262","refsource":"OSVDB","tags":["Patch"],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://secunia.com/advisories/23280","name":"23280","refsource":"SECUNIA","tags":[],"title":"HP-UX update for OpenSSL - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://docs.info.apple.com/article.html?artnum=304829","name":"http://docs.info.apple.com/article.html?artnum=304829","refsource":"CONFIRM","tags":[],"title":"About the security content of Security Update 2006-007","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.debian.org/security/2006/dsa-1195","name":"DSA-1195","refsource":"DEBIAN","tags":["Patch","Vendor Advisory"],"title":"Debian -- Security Information -- DSA-1195-1 openssl096","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html","name":"20060928 [SECURITY] OpenSSL 0.9.8d and 0.9.7l released","refsource":"FULLDISC","tags":["Patch"],"title":"[Full-disclosure] [SECURITY] OpenSSL 0.9.8d and 0.9.7l released","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/22772","name":"22772","refsource":"SECUNIA","tags":[],"title":"cwRsync OpenSSL Vulnerabilities and OpenSSH Weakness - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23340","name":"23340","refsource":"SECUNIA","tags":[],"title":"Avaya PDS HP-UX Secure Shell / OpenSSL Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1","name":"102711","refsource":"SUNALERT","tags":[],"title":"#102711: Security Vulnerabilities in OpenSSL May Lead to a Denial of Service (DoS)  to Applications or Execution of Arbitrary Code With Elevated Privileges","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/22116","name":"22116","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"Trustix updates for  openssh and openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22544","name":"22544","refsource":"SECUNIA","tags":[],"title":"Gentoo update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22260","name":"22260","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"Mandriva update for MySQL - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://openbsd.org/errata.html#openssl2","name":"[3.9] 20061007 013: SECURITY FIX: October 7, 2006","refsource":"OPENBSD","tags":["Patch"],"title":"OpenBSD 4.0 errata","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf","name":"http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22791","name":"22791","refsource":"SECUNIA","tags":[],"title":"Sun Solaris OpenSSL Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://kolab.org/security/kolab-vendor-notice-11.txt","name":"http://kolab.org/security/kolab-vendor-notice-11.txt","refsource":"CONFIRM","tags":["Patch"],"title":"404 Not Found","mime":"text/plain","httpstatus":"404","archivestatus":"200"},{"url":"http://security.gentoo.org/glsa/glsa-200610-11.xml","name":"GLSA-200610-11","refsource":"GENTOO","tags":[],"title":"Gentoo Linux Documentation\n--\n  OpenSSL: Multiple vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23309","name":"23309","refsource":"SECUNIA","tags":[],"title":"Gentoo update for  emul-linux-x86-baselibs - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml","name":"GLSA-200612-11","refsource":"GENTOO","tags":[],"title":"Gentoo Linux Documentation\n--\n  AMD64 x86 emulation base libraries: OpenSSL multiple vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100","name":"HPSBUX02174","refsource":"HP","tags":[],"title":"IT Resource Center - login / register","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/22207","name":"22207","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"Slackware update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144","name":"SSRT071304","refsource":"HP","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:172","name":"MDKSA-2006:172","refsource":"MANDRIVA","tags":[],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html","name":"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html","refsource":"CONFIRM","tags":[],"title":"Download Patch ESX-3069097 for VMware ESX Server 3.0.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/3820","name":"ADV-2006-3820","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1","name":"201531","refsource":"SUNALERT","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://secunia.com/advisories/31492","name":"31492","refsource":"SECUNIA","tags":[],"title":"Red Hat Network Satellite Server Update for Solaris Client - Advisories - Community","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881","name":"http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881","refsource":"CONFIRM","tags":[],"title":"Nortel: Technical Support","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/30161","name":"30161","refsource":"SECUNIA","tags":[],"title":"Gentoo ltsp Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/456546/100/200/threaded","name":"20070110 VMware ESX server security updates","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29237","name":"openssl-sslgetsharedciphers-bo(29237)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/22083","name":"22083","refsource":"BID","tags":[],"title":"Oracle January 2007 Security Update Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2006/4443","name":"ADV-2006-4443","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22094","name":"22094","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"FileZilla / FileZilla Server Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23915","name":"23915","refsource":"SECUNIA","tags":[],"title":"HP-UX update for Apache - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html","name":"http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html","refsource":"CONFIRM","tags":[],"title":"VMware ESX Server 2.0.2 Upgrade Patch 4 (for 2.0.2 Systems)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm","name":"http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm","refsource":"CONFIRM","tags":[],"title":"ASA-2006-220 (RHSA-2006-0695)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc","name":"NetBSD-SA2008-007","refsource":"NETBSD","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"http://secunia.com/advisories/22385","name":"22385","refsource":"SECUNIA","tags":[],"title":"Avaya Products OpenSSL Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/4750","name":"ADV-2006-4750","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/4036","name":"ADV-2006-4036","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/2783","name":"ADV-2007-2783","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-3738","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-3738","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7c","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7d","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7e","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7f","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7g","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7h","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7i","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7j","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7k","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8c","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7c","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7d","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7e","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7f","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7g","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7h","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7i","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7j","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.7k","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3738","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8c","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2006-3738","organization":"Red Hat","lastmodified":"2007-03-14","contributor":"Mark J Cox","statementText":"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.","cve_year":"2006","cve_id":"3738","crc32":"e4ada83e"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2006-3738","qid":"390284","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2023-0013)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2006-3738","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_affected":"=","version_value":"n/a"}]}}]}}]}},"references":{"reference_data":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc","refsource":"MISC","name":"ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc"},{"url":"http://docs.info.apple.com/article.html?artnum=304829","refsource":"MISC","name":"http://docs.info.apple.com/article.html?artnum=304829"},{"url":"http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html","refsource":"MISC","name":"http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html"},{"url":"http://secunia.com/advisories/22487","refsource":"MISC","name":"http://secunia.com/advisories/22487"},{"url":"http://secunia.com/advisories/23155","refsource":"MISC","name":"http://secunia.com/advisories/23155"},{"url":"http://www.us-cert.gov/cas/techalerts/TA06-333A.html","refsource":"MISC","name":"http://www.us-cert.gov/cas/techalerts/TA06-333A.html"},{"url":"http://www.vupen.com/english/advisories/2006/4750","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/4750"},{"url":"http://secunia.com/advisories/31492","refsource":"MISC","name":"http://secunia.com/advisories/31492"},{"url":"http://www.redhat.com/support/errata/RHSA-2008-0629.html","refsource":"MISC","name":"http://www.redhat.com/support/errata/RHSA-2008-0629.html"},{"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc","refsource":"MISC","name":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc"},{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771","refsource":"MISC","name":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771"},{"url":"http://issues.rpath.com/browse/RPL-613","refsource":"MISC","name":"http://issues.rpath.com/browse/RPL-613"},{"url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100","refsource":"MISC","name":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100"},{"url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540","refsource":"MISC","name":"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540"},{"url":"http://kolab.org/security/kolab-vendor-notice-11.txt","refsource":"MISC","name":"http://kolab.org/security/kolab-vendor-notice-11.txt"},{"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html","refsource":"MISC","name":"http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html"},{"url":"http://marc.info/?l=bugtraq&m=130497311408250&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=130497311408250&w=2"},{"url":"http://openbsd.org/errata.html#openssl2","refsource":"MISC","name":"http://openbsd.org/errata.html#openssl2"},{"url":"http://openvpn.net/changelog.html","refsource":"MISC","name":"http://openvpn.net/changelog.html"},{"url":"http://secunia.com/advisories/22094","refsource":"MISC","name":"http://secunia.com/advisories/22094"},{"url":"http://secunia.com/advisories/22116","refsource":"MISC","name":"http://secunia.com/advisories/22116"},{"url":"http://secunia.com/advisories/22130","refsource":"MISC","name":"http://secunia.com/advisories/22130"},{"url":"http://secunia.com/advisories/22165","refsource":"MISC","name":"http://secunia.com/advisories/22165"},{"url":"http://secunia.com/advisories/22166","refsource":"MISC","name":"http://secunia.com/advisories/22166"},{"url":"http://secunia.com/advisories/22172","refsource":"MISC","name":"http://secunia.com/advisories/22172"},{"url":"http://secunia.com/advisories/22186","refsource":"MISC","name":"http://secunia.com/advisories/22186"},{"url":"http://secunia.com/advisories/22193","refsource":"MISC","name":"http://secunia.com/advisories/22193"},{"url":"http://secunia.com/advisories/22207","refsource":"MISC","name":"http://secunia.com/advisories/22207"},{"url":"http://secunia.com/advisories/22212","refsource":"MISC","name":"http://secunia.com/advisories/22212"},{"url":"http://secunia.com/advisories/22216","refsource":"MISC","name":"http://secunia.com/advisories/22216"},{"url":"http://secunia.com/advisories/22220","refsource":"MISC","name":"http://secunia.com/advisories/22220"},{"url":"http://secunia.com/advisories/22240","refsource":"MISC","name":"http://secunia.com/advisories/22240"},{"url":"http://secunia.com/advisories/22259","refsource":"MISC","name":"http://secunia.com/advisories/22259"},{"url":"http://secunia.com/advisories/22260","refsource":"MISC","name":"http://secunia.com/advisories/22260"},{"url":"http://secunia.com/advisories/22284","refsource":"MISC","name":"http://secunia.com/advisories/22284"},{"url":"http://secunia.com/advisories/22298","refsource":"MISC","name":"http://secunia.com/advisories/22298"},{"url":"http://secunia.com/advisories/22330","refsource":"MISC","name":"http://secunia.com/advisories/22330"},{"url":"http://secunia.com/advisories/22385","refsource":"MISC","name":"http://secunia.com/advisories/22385"},{"url":"http://secunia.com/advisories/22460","refsource":"MISC","name":"http://secunia.com/advisories/22460"},{"url":"http://secunia.com/advisories/22500","refsource":"MISC","name":"http://secunia.com/advisories/22500"},{"url":"http://secunia.com/advisories/22544","refsource":"MISC","name":"http://secunia.com/advisories/22544"},{"url":"http://secunia.com/advisories/22626","refsource":"MISC","name":"http://secunia.com/advisories/22626"},{"url":"http://secunia.com/advisories/22758","refsource":"MISC","name":"http://secunia.com/advisories/22758"},{"url":"http://secunia.com/advisories/22772","refsource":"MISC","name":"http://secunia.com/advisories/22772"},{"url":"http://secunia.com/advisories/22799","refsource":"MISC","name":"http://secunia.com/advisories/22799"},{"url":"http://secunia.com/advisories/23038","refsource":"MISC","name":"http://secunia.com/advisories/23038"},{"url":"http://secunia.com/advisories/23280","refsource":"MISC","name":"http://secunia.com/advisories/23280"},{"url":"http://secunia.com/advisories/23309","refsource":"MISC","name":"http://secunia.com/advisories/23309"},{"url":"http://secunia.com/advisories/23340","refsource":"MISC","name":"http://secunia.com/advisories/23340"},{"url":"http://secunia.com/advisories/23680","refsource":"MISC","name":"http://secunia.com/advisories/23680"},{"url":"http://secunia.com/advisories/23794","refsource":"MISC","name":"http://secunia.com/advisories/23794"},{"url":"http://secunia.com/advisories/23915","refsource":"MISC","name":"http://secunia.com/advisories/23915"},{"url":"http://secunia.com/advisories/24930","refsource":"MISC","name":"http://secunia.com/advisories/24930"},{"url":"http://secunia.com/advisories/24950","refsource":"MISC","name":"http://secunia.com/advisories/24950"},{"url":"http://secunia.com/advisories/25889","refsource":"MISC","name":"http://secunia.com/advisories/25889"},{"url":"http://secunia.com/advisories/26329","refsource":"MISC","name":"http://secunia.com/advisories/26329"},{"url":"http://secunia.com/advisories/30124","refsource":"MISC","name":"http://secunia.com/advisories/30124"},{"url":"http://security.gentoo.org/glsa/glsa-200610-11.xml","refsource":"MISC","name":"http://security.gentoo.org/glsa/glsa-200610-11.xml"},{"url":"http://securitytracker.com/id?1016943","refsource":"MISC","name":"http://securitytracker.com/id?1016943"},{"url":"http://securitytracker.com/id?1017522","refsource":"MISC","name":"http://securitytracker.com/id?1017522"},{"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946","refsource":"MISC","name":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946"},{"url":"http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227","refsource":"MISC","name":"http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1","refsource":"MISC","name":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm","refsource":"MISC","name":"http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm","refsource":"MISC","name":"http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm"},{"url":"http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html","refsource":"MISC","name":"http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html"},{"url":"http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml","refsource":"MISC","name":"http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml"},{"url":"http://www.debian.org/security/2006/dsa-1185","refsource":"MISC","name":"http://www.debian.org/security/2006/dsa-1185"},{"url":"http://www.debian.org/security/2006/dsa-1195","refsource":"MISC","name":"http://www.debian.org/security/2006/dsa-1195"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml","refsource":"MISC","name":"http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:172","refsource":"MISC","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:172"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:177","refsource":"MISC","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:177"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:178","refsource":"MISC","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:178"},{"url":"http://www.novell.com/linux/security/advisories/2006_24_sr.html","refsource":"MISC","name":"http://www.novell.com/linux/security/advisories/2006_24_sr.html"},{"url":"http://www.novell.com/linux/security/advisories/2006_58_openssl.html","refsource":"MISC","name":"http://www.novell.com/linux/security/advisories/2006_58_openssl.html"},{"url":"http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html","refsource":"MISC","name":"http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html"},{"url":"http://www.openssl.org/news/secadv_20060928.txt","refsource":"MISC","name":"http://www.openssl.org/news/secadv_20060928.txt"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0695.html","refsource":"MISC","name":"http://www.redhat.com/support/errata/RHSA-2006-0695.html"},{"url":"http://www.securityfocus.com/archive/1/447318/100/0/threaded","refsource":"MISC","name":"http://www.securityfocus.com/archive/1/447318/100/0/threaded"},{"url":"http://www.securityfocus.com/archive/1/447393/100/0/threaded","refsource":"MISC","name":"http://www.securityfocus.com/archive/1/447393/100/0/threaded"},{"url":"http://www.securityfocus.com/archive/1/456546/100/200/threaded","refsource":"MISC","name":"http://www.securityfocus.com/archive/1/456546/100/200/threaded"},{"url":"http://www.securityfocus.com/bid/22083","refsource":"MISC","name":"http://www.securityfocus.com/bid/22083"},{"url":"http://www.serv-u.com/releasenotes/","refsource":"MISC","name":"http://www.serv-u.com/releasenotes/"},{"url":"http://www.trustix.org/errata/2006/0054","refsource":"MISC","name":"http://www.trustix.org/errata/2006/0054"},{"url":"http://www.ubuntu.com/usn/usn-353-1","refsource":"MISC","name":"http://www.ubuntu.com/usn/usn-353-1"},{"url":"http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html","refsource":"MISC","name":"http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html"},{"url":"http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html","refsource":"MISC","name":"http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html"},{"url":"http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html","refsource":"MISC","name":"http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html"},{"url":"http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html","refsource":"MISC","name":"http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html"},{"url":"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html","refsource":"MISC","name":"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"},{"url":"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html","refsource":"MISC","name":"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"},{"url":"http://www.vupen.com/english/advisories/2006/3820","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/3820"},{"url":"http://www.vupen.com/english/advisories/2006/3860","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/3860"},{"url":"http://www.vupen.com/english/advisories/2006/3869","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/3869"},{"url":"http://www.vupen.com/english/advisories/2006/3902","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/3902"},{"url":"http://www.vupen.com/english/advisories/2006/3936","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/3936"},{"url":"http://www.vupen.com/english/advisories/2006/4036","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/4036"},{"url":"http://www.vupen.com/english/advisories/2006/4264","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/4264"},{"url":"http://www.vupen.com/english/advisories/2006/4401","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/4401"},{"url":"http://www.vupen.com/english/advisories/2006/4417","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/4417"},{"url":"http://www.vupen.com/english/advisories/2007/0343","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/0343"},{"url":"http://www.vupen.com/english/advisories/2007/1401","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/1401"},{"url":"http://www.vupen.com/english/advisories/2007/2315","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/2315"},{"url":"http://www.vupen.com/english/advisories/2007/2783","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/2783"},{"url":"http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf","refsource":"MISC","name":"http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf"},{"url":"https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144","refsource":"MISC","name":"https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144"},{"url":"http://secunia.com/advisories/22633","refsource":"MISC","name":"http://secunia.com/advisories/22633"},{"url":"http://secunia.com/advisories/22654","refsource":"MISC","name":"http://secunia.com/advisories/22654"},{"url":"http://secunia.com/advisories/22791","refsource":"MISC","name":"http://secunia.com/advisories/22791"},{"url":"http://secunia.com/advisories/30161","refsource":"MISC","name":"http://secunia.com/advisories/30161"},{"url":"http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc","refsource":"MISC","name":"http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1","refsource":"MISC","name":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1","refsource":"MISC","name":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml","refsource":"MISC","name":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"},{"url":"http://www.kb.cert.org/vuls/id/547300","refsource":"MISC","name":"http://www.kb.cert.org/vuls/id/547300"},{"url":"http://www.osvdb.org/29262","refsource":"MISC","name":"http://www.osvdb.org/29262"},{"url":"http://www.securityfocus.com/archive/1/470460/100/0/threaded","refsource":"MISC","name":"http://www.securityfocus.com/archive/1/470460/100/0/threaded"},{"url":"http://www.securityfocus.com/bid/20249","refsource":"MISC","name":"http://www.securityfocus.com/bid/20249"},{"url":"http://www.vupen.com/english/advisories/2006/4314","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/4314"},{"url":"http://www.vupen.com/english/advisories/2006/4443","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/4443"},{"url":"http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881","refsource":"MISC","name":"http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29237","refsource":"MISC","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29237"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256","refsource":"MISC","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370","refsource":"MISC","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370"}]}},"nvd":{"publishedDate":"2006-09-28 18:07:00","lastModifiedDate":"2018-10-17 21:29:00","problem_types":["CWE-119"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"3738","Ordinal":"19064","Title":"CVE-2006-3738","CVE":"CVE-2006-3738","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"3738","Ordinal":"1","NoteData":"Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.","Type":"Description","Title":null},{"CveYear":"2006","CveId":"3738","Ordinal":"2","NoteData":"2006-09-28","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"3738","Ordinal":"3","NoteData":"2018-10-17","Type":"Other","Title":"Modified"}]}}}