CVE-2008-0891

Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.
References
Link Resource
http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html
http://secunia.com/advisories/30405 Vendor Advisory
http://secunia.com/advisories/30460
http://secunia.com/advisories/30825
http://secunia.com/advisories/30852
http://secunia.com/advisories/30868
http://secunia.com/advisories/31228
http://secunia.com/advisories/31288
http://security.gentoo.org/glsa/glsa-200806-08.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.562004
http://sourceforge.net/project/shownotes.php?release_id=615606
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738400
http://www.kb.cert.org/vuls/id/661475 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:107
http://www.openssl.org/news/secadv_20080528.txt
http://www.securityfocus.com/bid/29405 Patch
http://www.securitytracker.com/id?1020121
http://www.ubuntu.com/usn/usn-620-1
http://www.vupen.com/english/advisories/2008/1680
http://www.vupen.com/english/advisories/2008/1937/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/42666
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01029.html
http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html
http://secunia.com/advisories/30405 Vendor Advisory
http://secunia.com/advisories/30460
http://secunia.com/advisories/30825
http://secunia.com/advisories/30852
http://secunia.com/advisories/30868
http://secunia.com/advisories/31228
http://secunia.com/advisories/31288
http://security.gentoo.org/glsa/glsa-200806-08.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.562004
http://sourceforge.net/project/shownotes.php?release_id=615606
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738400
http://www.kb.cert.org/vuls/id/661475 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:107
http://www.openssl.org/news/secadv_20080528.txt
http://www.securityfocus.com/bid/29405 Patch
http://www.securitytracker.com/id?1020121
http://www.ubuntu.com/usn/usn-620-1
http://www.vupen.com/english/advisories/2008/1680
http://www.vupen.com/english/advisories/2008/1937/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/42666
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01029.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*

History

21 Nov 2024, 00:43

Type Values Removed Values Added
References () http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html - () http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html -
References () http://secunia.com/advisories/30405 - Vendor Advisory () http://secunia.com/advisories/30405 - Vendor Advisory
References () http://secunia.com/advisories/30460 - () http://secunia.com/advisories/30460 -
References () http://secunia.com/advisories/30825 - () http://secunia.com/advisories/30825 -
References () http://secunia.com/advisories/30852 - () http://secunia.com/advisories/30852 -
References () http://secunia.com/advisories/30868 - () http://secunia.com/advisories/30868 -
References () http://secunia.com/advisories/31228 - () http://secunia.com/advisories/31228 -
References () http://secunia.com/advisories/31288 - () http://secunia.com/advisories/31288 -
References () http://security.gentoo.org/glsa/glsa-200806-08.xml - () http://security.gentoo.org/glsa/glsa-200806-08.xml -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.562004 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.562004 -
References () http://sourceforge.net/project/shownotes.php?release_id=615606 - () http://sourceforge.net/project/shownotes.php?release_id=615606 -
References () http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738400 - () http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738400 -
References () http://www.kb.cert.org/vuls/id/661475 - US Government Resource () http://www.kb.cert.org/vuls/id/661475 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:107 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:107 -
References () http://www.openssl.org/news/secadv_20080528.txt - () http://www.openssl.org/news/secadv_20080528.txt -
References () http://www.securityfocus.com/bid/29405 - Patch () http://www.securityfocus.com/bid/29405 - Patch
References () http://www.securitytracker.com/id?1020121 - () http://www.securitytracker.com/id?1020121 -
References () http://www.ubuntu.com/usn/usn-620-1 - () http://www.ubuntu.com/usn/usn-620-1 -
References () http://www.vupen.com/english/advisories/2008/1680 - () http://www.vupen.com/english/advisories/2008/1680 -
References () http://www.vupen.com/english/advisories/2008/1937/references - () http://www.vupen.com/english/advisories/2008/1937/references -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/42666 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/42666 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01029.html - () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01029.html -

Information

Published : 2008-05-29 16:32

Updated : 2025-04-09 00:30


NVD link : CVE-2008-0891

Mitre link : CVE-2008-0891

CVE.ORG link : CVE-2008-0891


JSON object : View

Products Affected

openssl

  • openssl
CWE
CWE-189

Numeric Errors