ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:02
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-009.txt.asc - Broken Link, Third Party Advisory | |
References | () http://cvs.openssl.org/chngview?cn=17369 - Broken Link, Patch, Third Party Advisory | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444 - Broken Link, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html - Third Party Advisory | |
References | () http://lists.vmware.com/pipermail/security-announce/2010/000082.html - Mailing List, Third Party Advisory | |
References | () http://rt.openssl.org/Ticket/Display.html?id=1679&user=guest&pass=guest - Third Party Advisory, Vendor Advisory | |
References | () http://secunia.com/advisories/35571 - Not Applicable, Third Party Advisory | |
References | () http://secunia.com/advisories/35685 - Not Applicable, Third Party Advisory | |
References | () http://secunia.com/advisories/35729 - Not Applicable, Third Party Advisory | |
References | () http://secunia.com/advisories/36533 - Not Applicable, Third Party Advisory | |
References | () http://secunia.com/advisories/38794 - Not Applicable, Third Party Advisory | |
References | () http://secunia.com/advisories/38834 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2009/06/02/1 - Mailing List, Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2009-1335.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/35174 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-792-1 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0528 - Permissions Required, Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/50963 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11179 - Broken Link, Tool Signature | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7469 - Broken Link, Tool Signature | |
References | () https://www.exploit-db.com/exploits/8873 - Exploit, Third Party Advisory, VDB Entry |
07 Feb 2024, 18:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/35571 - Not Applicable, Third Party Advisory | |
References | () http://secunia.com/advisories/35685 - Not Applicable, Third Party Advisory | |
References | () http://secunia.com/advisories/35729 - Not Applicable, Third Party Advisory | |
References | () http://secunia.com/advisories/36533 - Not Applicable, Third Party Advisory | |
References | () http://secunia.com/advisories/38794 - Not Applicable, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/35174 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11179 - Broken Link, Tool Signature | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7469 - Broken Link, Tool Signature | |
CPE | cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8:-:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:* |
02 Feb 2022, 15:13
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-476 | |
CPE | cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8c-9:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8c-6:*:*:*:*:*:*:* cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8d-8:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8e-9:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8g-9:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8c-2:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:* cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8e-5:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8f-5:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8f-9:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8d-2:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8d-9:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8f-4:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:*:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8c-7:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8c-3:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8d-5:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8d-1:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8e-4:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8e-1:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8g-4:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8f:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8d-4:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8g-6:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8g-3:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8e-8:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8g-1:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8f-8:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:* cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8c-8:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8d-3:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8g-2:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8e-3:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8c-1:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8f-7:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8f-2:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8c-5:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8f-6:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8e-2:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8e-7:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8g-7:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8e-6:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8g-8:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8d-6:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8f-1:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8d-7:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:* cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8c-4:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8f-3:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:* cpe:2.3:a:openssl_project:openssl:0.9.8g-5:*:*:*:*:*:*:* cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:* |
cpe:2.3:a:openssl:openssl:0.9.8:-:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* |
References | (EXPLOIT-DB) https://www.exploit-db.com/exploits/8873 - Exploit, Third Party Advisory, VDB Entry | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11179 - Tool Signature | |
References | (SECUNIA) http://secunia.com/advisories/36533 - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/35174 - Exploit, Third Party Advisory, VDB Entry | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/0528 - Permissions Required, Third Party Advisory | |
References | (MLIST) http://lists.vmware.com/pipermail/security-announce/2010/000082.html - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2009/06/02/1 - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/35729 - Third Party Advisory | |
References | (HP) http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444 - Broken Link, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/35685 - Third Party Advisory | |
References | (NETBSD) ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-009.txt.asc - Broken Link, Third Party Advisory | |
References | (CONFIRM) http://rt.openssl.org/Ticket/Display.html?id=1679&user=guest&pass=guest - Third Party Advisory, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/38794 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/38834 - Third Party Advisory | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7469 - Tool Signature | |
References | (SECUNIA) http://secunia.com/advisories/35571 - Third Party Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/50963 - Third Party Advisory, VDB Entry | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2009-1335.html - Third Party Advisory | |
References | (CONFIRM) http://cvs.openssl.org/chngview?cn=17369 - Broken Link, Patch, Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-792-1 - Third Party Advisory |
Information
Published : 2009-06-04 16:30
Updated : 2024-11-21 01:02
NVD link : CVE-2009-1386
Mitre link : CVE-2009-1386
CVE.ORG link : CVE-2009-1386
JSON object : View
Products Affected
openssl
- openssl
redhat
- openssl
canonical
- ubuntu_linux
CWE
CWE-476
NULL Pointer Dereference