{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T11:42:48.145","vulnerabilities":[{"cve":{"id":"CVE-2011-4109","sourceIdentifier":"secalert@redhat.com","published":"2012-01-06T01:55:00.830","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check."},{"lang":"es","value":"Una vulnerabilidad de doble liberación en OpenSSL v0.9.8 antes de v0.9.8s, cuando la opción X509_V_FLAG_POLICY_CHECK está activada, permite a atacantes remotos tener un impacto no especificado al provocar el fallo de un control de la política."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*","matchCriteriaId":"8A4E446D-B9D3-45F2-9722-B41FA14A6C31"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*","matchCriteriaId":"AF4EA988-FC80-4170-8933-7C6663731981"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*","matchCriteriaId":"64F8F53B-24A1-4877-B16E-F1917C4E4E81"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*","matchCriteriaId":"75D3ACD5-905F-42BB-BE1A-8382E9D823BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*","matchCriteriaId":"766EA6F2-7FA4-4713-9859-9971CCD2FDCB"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*","matchCriteriaId":"EFBC30B7-627D-48DC-8EF0-AE8FA0C6EDBA"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*","matchCriteriaId":"2BB38AEA-BAF0-4920-9A71-747C24444770"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*","matchCriteriaId":"1F33EA2B-DE15-4695-A383-7A337AC38908"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*","matchCriteriaId":"261EE631-AB43-44FE-B02A-DFAAB8D35927"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*","matchCriteriaId":"FA0E0BBF-D0BE-41A7-B9BB-C28F01000BC0"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*","matchCriteriaId":"1A1365ED-4651-4AB2-A64B-43782EA2F0E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*","matchCriteriaId":"EC82690C-DCED-47BA-AA93-4D0C9E95B806"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*","matchCriteriaId":"43B90ED1-DAB4-4239-8AD8-87E8D568D5D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*","matchCriteriaId":"3C9BF2DD-85EF-49CF-8D83-0DB46449E333"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*","matchCriteriaId":"86C46AB8-52E5-4385-9C5C-F63FF9DB82AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*","matchCriteriaId":"564AA4E7-223E-48D8-B3E0-A461969CF530"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*","matchCriteriaId":"A82CFB41-BEA5-4B5F-BCAA-9BAED22EEAF0"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*","matchCriteriaId":"35C2AE06-B6E8-41C4-BB60-177AC4819CE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*","matchCriteriaId":"EB15C1F3-0DE8-4A50-B17C-618ECA58AABF"}]}]}],"references":[{"url":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc","source":"secalert@redhat.com"},{"url":"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html","source":"secalert@redhat.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html","source":"secalert@redhat.com"},{"url":"http://marc.info/?l=bugtraq&m=132750648501816&w=2","source":"secalert@redhat.com"},{"url":"http://marc.info/?l=bugtraq&m=134039053214295&w=2","source":"secalert@redhat.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1306.html","source":"secalert@redhat.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1307.html","source":"secalert@redhat.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1308.html","source":"secalert@redhat.com"},{"url":"http://secunia.com/advisories/48528","source":"secalert@redhat.com"},{"url":"http://support.apple.com/kb/HT5784","source":"secalert@redhat.com"},{"url":"http://www.debian.org/security/2012/dsa-2390","source":"secalert@redhat.com"},{"url":"http://www.kb.cert.org/vuls/id/737740","source":"secalert@redhat.com","tags":["US Government Resource"]},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:006","source":"secalert@redhat.com"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:007","source":"secalert@redhat.com"},{"url":"http://www.openssl.org/news/secadv_20120104.txt","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/72129","source":"secalert@redhat.com"},{"url":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=132750648501816&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=134039053214295&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1306.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1307.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2012-1308.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/48528","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.apple.com/kb/HT5784","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2012/dsa-2390","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kb.cert.org/vuls/id/737740","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:006","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:007","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openssl.org/news/secadv_20120104.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/72129","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}