Dr. Stephen Henson (email@example.com), using a test suite provided by NISCC (http://www.niscc.gov.uk/), discovered a number of errors in the OpenSSL ASN1 code. Combined with an error that causes the OpenSSL code to parse client certificates even when it should not, these errors can cause a denial of service (DoS) condition on a system using the OpenSSL code, depending on how that code is used. For example, even though apache-ssl and ssh link to OpenSSL libraries, they should not be affected by this vulnerability. However, other SSL-enabled applications may be vulnerable and an OpenSSL upgrade is recommended.
For the current stable distribution (woody) these problems have been fixed in version 0.9.6c-2.woody.4.
For the unstable distribution (sid) these problems have been fixed in version 0.9.7c-1.
We recommend that you update your openssl package. Note that you will need to restart services which use the libssl library for this update to take effect.
MD5 checksums of the listed files are available in the original advisory.