{"api_version":"1","generated_at":"2026-04-22T23:30:56+00:00","cve":"CVE-2007-4995","urls":{"html":"https://cve.report/CVE-2007-4995","api":"https://cve.report/api/cve/CVE-2007-4995.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2007-4995","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2007-4995"},"summary":{"title":"CVE-2007-4995","description":"Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2007-10-13 01:17:00","updated_at":"2018-10-15 21:39:00"},"problem_types":["CWE-189"],"metrics":[],"references":[{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773","name":"HPSBUX02296","refsource":"HP","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://usn.ubuntu.com/534-1/","name":"USN-534-1","refsource":"UBUNTU","tags":[],"title":"USN-534-1: OpenSSL vulnerability | Ubuntu security notices","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html","name":"SUSE-SR:2007:021","refsource":"SUSE","tags":[],"title":"[security-announce] SUSE Security Summary Report SUSE-SR:2007:021","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/3487","name":"ADV-2007-3487","refsource":"VUPEN","tags":["Vendor Advisory"],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2008/dsa-1571","name":"DSA-1571","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-1571-1 openssl","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27933","name":"27933","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Mandriva update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1018810","name":"1018810","refsource":"SECTRACK","tags":[],"title":"SecurityTracker.com Archives - OpenSSL DTLS Bug May Let Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25878","name":"25878","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"OpenSSL DTLS Implementation Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.gentoo.org/glsa/glsa-200710-30.xml","name":"GLSA-200710-30","refsource":"GENTOO","tags":[],"title":"Gentoo Linux Documentation\n--\n  OpenSSL: Remote execution of arbitrary code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/30852","name":"30852","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Nortel Media Processing Server OpenSSL Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27363","name":"27363","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Ubuntu update for OpenSSL - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openssl.org/news/secadv_20071012.txt","name":"http://www.openssl.org/news/secadv_20071012.txt","refsource":"CONFIRM","tags":["Patch"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/482167/100/0/threaded","name":"20071012 OpenSSL Security Advisory","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/37185","name":"openssl-dtls-code-execution(37185)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml","name":"GLSA-200805-07","refsource":"GENTOO","tags":[],"title":"Linux Terminal Server Project: Multiple vulnerabilities — Gentoo Linux Documentation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27271","name":"27271","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"SUSE Updates for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738962","name":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738962","refsource":"MISC","tags":[],"title":"Nortel: Technical Support: Nortel Response to OpenSSL DTLS Heap Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/1937/references","name":"ADV-2008-1937","refsource":"VUPEN","tags":["Vendor Advisory"],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27434","name":"27434","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Gentoo update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288","name":"oval:org.mitre.oval:def:10288","refsource":"OVAL","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27205","name":"27205","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Red Hat update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/28084","name":"28084","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"HP-UX update for OpenSSL - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/26055","name":"26055","refsource":"BID","tags":[],"title":"OpenSSL DTLS Heap Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0964.html","name":"RHSA-2007:0964","refsource":"REDHAT","tags":["Vendor Advisory"],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/4219","name":"ADV-2007-4219","refsource":"VUPEN","tags":["Vendor Advisory"],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/30161","name":"30161","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Gentoo ltsp Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:237","name":"MDKSA-2007:237","refsource":"MANDRIVA","tags":[],"title":"Support / Security / Advisories /  / MDKSA-2007:237 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/30220","name":"30220","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Debian OpenSSL Predictable Random Number Generator and Update - Secunia Advisories - Vulnerability Information - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27217","name":"27217","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Fedora update for openssl - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html","name":"FEDORA-2007-725","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora Core 6 Update: openssl-0.9.8b-15.fc6","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://bugs.gentoo.org/show_bug.cgi?id=195634","name":"http://bugs.gentoo.org/show_bug.cgi?id=195634","refsource":"CONFIRM","tags":[],"title":"Gentoo Bug 195634 - dev-libs/openssl < 0.9.8f  DTLS vulnerability (CVE-2007-4995)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2007-4995","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-4995","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2007","cve_id":"4995","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4995","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4995","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4995","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8c","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4995","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8d","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4995","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8e","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4995","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4995","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4995","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4995","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8c","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4995","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8d","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"4995","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8e","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2007-4995","organization":"Red Hat","lastmodified":"2007-10-24","contributor":"Mark J Cox","statementText":"This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4. An update to correct this issue for Enterprise Linux 5 is available. http://rhn.redhat.com/cve/CVE-2007-4995.html Please note that the CVE description is incorrect, this issue did not affect upstream versions of OpenSSL prior to 0.9.8.","cve_year":"2007","cve_id":"4995","crc32":"62e2735e"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2007-4995","qid":"390284","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2023-0013)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2007-4995","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_affected":"=","version_value":"n/a"}]}}]}}]}},"references":{"reference_data":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"},{"url":"http://secunia.com/advisories/27271","refsource":"MISC","name":"http://secunia.com/advisories/27271"},{"url":"http://secunia.com/advisories/30161","refsource":"MISC","name":"http://secunia.com/advisories/30161"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml","refsource":"MISC","name":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"},{"url":"http://secunia.com/advisories/27205","refsource":"MISC","name":"http://secunia.com/advisories/27205"},{"url":"http://secunia.com/advisories/30220","refsource":"MISC","name":"http://secunia.com/advisories/30220"},{"url":"http://www.debian.org/security/2008/dsa-1571","refsource":"MISC","name":"http://www.debian.org/security/2008/dsa-1571"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0964.html","refsource":"MISC","name":"http://www.redhat.com/support/errata/RHSA-2007-0964.html"},{"url":"http://bugs.gentoo.org/show_bug.cgi?id=195634","refsource":"MISC","name":"http://bugs.gentoo.org/show_bug.cgi?id=195634"},{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773","refsource":"MISC","name":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773"},{"url":"http://secunia.com/advisories/25878","refsource":"MISC","name":"http://secunia.com/advisories/25878"},{"url":"http://secunia.com/advisories/27217","refsource":"MISC","name":"http://secunia.com/advisories/27217"},{"url":"http://secunia.com/advisories/27363","refsource":"MISC","name":"http://secunia.com/advisories/27363"},{"url":"http://secunia.com/advisories/27434","refsource":"MISC","name":"http://secunia.com/advisories/27434"},{"url":"http://secunia.com/advisories/27933","refsource":"MISC","name":"http://secunia.com/advisories/27933"},{"url":"http://secunia.com/advisories/28084","refsource":"MISC","name":"http://secunia.com/advisories/28084"},{"url":"http://secunia.com/advisories/30852","refsource":"MISC","name":"http://secunia.com/advisories/30852"},{"url":"http://security.gentoo.org/glsa/glsa-200710-30.xml","refsource":"MISC","name":"http://security.gentoo.org/glsa/glsa-200710-30.xml"},{"url":"http://securitytracker.com/id?1018810","refsource":"MISC","name":"http://securitytracker.com/id?1018810"},{"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738962","refsource":"MISC","name":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738962"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:237","refsource":"MISC","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:237"},{"url":"http://www.openssl.org/news/secadv_20071012.txt","refsource":"MISC","name":"http://www.openssl.org/news/secadv_20071012.txt"},{"url":"http://www.securityfocus.com/archive/1/482167/100/0/threaded","refsource":"MISC","name":"http://www.securityfocus.com/archive/1/482167/100/0/threaded"},{"url":"http://www.securityfocus.com/bid/26055","refsource":"MISC","name":"http://www.securityfocus.com/bid/26055"},{"url":"http://www.vupen.com/english/advisories/2007/3487","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/3487"},{"url":"http://www.vupen.com/english/advisories/2007/4219","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/4219"},{"url":"http://www.vupen.com/english/advisories/2008/1937/references","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2008/1937/references"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/37185","refsource":"MISC","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/37185"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288","refsource":"MISC","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288"},{"url":"https://usn.ubuntu.com/534-1/","refsource":"MISC","name":"https://usn.ubuntu.com/534-1/"},{"url":"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html","refsource":"MISC","name":"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html"}]}},"nvd":{"publishedDate":"2007-10-13 01:17:00","lastModifiedDate":"2018-10-15 21:39:00","problem_types":["CWE-189"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9.3},"severity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2007","CveId":"4995","Ordinal":"27672","Title":"CVE-2007-4995","CVE":"CVE-2007-4995","Year":"2007"},"notes":[{"CveYear":"2007","CveId":"4995","Ordinal":"1","NoteData":"Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.","Type":"Description","Title":null},{"CveYear":"2007","CveId":"4995","Ordinal":"2","NoteData":"2007-10-12","Type":"Other","Title":"Published"},{"CveYear":"2007","CveId":"4995","Ordinal":"3","NoteData":"2018-10-15","Type":"Other","Title":"Modified"}]}}}