CVE-2010-3864

Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
References
Link Resource
http://blogs.sun.com/security/entry/cve_2010_3864_race_condition
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051170.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051237.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051255.html
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
http://marc.info/?l=bugtraq&m=129916880600544&w=2
http://marc.info/?l=bugtraq&m=129916880600544&w=2
http://marc.info/?l=bugtraq&m=130497251507577&w=2
http://marc.info/?l=bugtraq&m=130497251507577&w=2
http://marc.info/?l=bugtraq&m=132828103218869&w=2
http://marc.info/?l=bugtraq&m=132828103218869&w=2
http://openssl.org/news/secadv_20101116.txt Patch Vendor Advisory
http://secunia.com/advisories/42241
http://secunia.com/advisories/42243 Vendor Advisory
http://secunia.com/advisories/42309
http://secunia.com/advisories/42336
http://secunia.com/advisories/42352
http://secunia.com/advisories/42397
http://secunia.com/advisories/42413
http://secunia.com/advisories/43312
http://secunia.com/advisories/44269
http://secunia.com/advisories/57353
http://security.FreeBSD.org/advisories/FreeBSD-SA-10:10.openssl.asc
http://securitytracker.com/id?1024743 Patch
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668793
http://support.apple.com/kb/HT4723
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
http://www.adobe.com/support/security/bulletins/apsb11-11.html
http://www.debian.org/security/2010/dsa-2125
http://www.kb.cert.org/vuls/id/737740 US Government Resource
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.vupen.com/english/advisories/2010/3041
http://www.vupen.com/english/advisories/2010/3077
http://www.vupen.com/english/advisories/2010/3097
http://www.vupen.com/english/advisories/2010/3121
https://bugzilla.redhat.com/show_bug.cgi?id=649304 Patch
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
https://rhn.redhat.com/errata/RHSA-2010-0888.html
http://blogs.sun.com/security/entry/cve_2010_3864_race_condition
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051170.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051237.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051255.html
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
http://marc.info/?l=bugtraq&m=129916880600544&w=2
http://marc.info/?l=bugtraq&m=129916880600544&w=2
http://marc.info/?l=bugtraq&m=130497251507577&w=2
http://marc.info/?l=bugtraq&m=130497251507577&w=2
http://marc.info/?l=bugtraq&m=132828103218869&w=2
http://marc.info/?l=bugtraq&m=132828103218869&w=2
http://openssl.org/news/secadv_20101116.txt Patch Vendor Advisory
http://secunia.com/advisories/42241
http://secunia.com/advisories/42243 Vendor Advisory
http://secunia.com/advisories/42309
http://secunia.com/advisories/42336
http://secunia.com/advisories/42352
http://secunia.com/advisories/42397
http://secunia.com/advisories/42413
http://secunia.com/advisories/43312
http://secunia.com/advisories/44269
http://secunia.com/advisories/57353
http://security.FreeBSD.org/advisories/FreeBSD-SA-10:10.openssl.asc
http://securitytracker.com/id?1024743 Patch
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668793
http://support.apple.com/kb/HT4723
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
http://www.adobe.com/support/security/bulletins/apsb11-11.html
http://www.debian.org/security/2010/dsa-2125
http://www.kb.cert.org/vuls/id/737740 US Government Resource
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.vupen.com/english/advisories/2010/3041
http://www.vupen.com/english/advisories/2010/3077
http://www.vupen.com/english/advisories/2010/3097
http://www.vupen.com/english/advisories/2010/3121
https://bugzilla.redhat.com/show_bug.cgi?id=649304 Patch
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
https://rhn.redhat.com/errata/RHSA-2010-0888.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://blogs.sun.com/security/entry/cve_2010_3864_race_condition - () http://blogs.sun.com/security/entry/cve_2010_3864_race_condition -
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777 -
References () http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html - () http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051170.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051170.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051237.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051237.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051255.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051255.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html -
References () http://marc.info/?l=bugtraq&m=129916880600544&w=2 - () http://marc.info/?l=bugtraq&m=129916880600544&w=2 -
References () http://marc.info/?l=bugtraq&m=130497251507577&w=2 - () http://marc.info/?l=bugtraq&m=130497251507577&w=2 -
References () http://marc.info/?l=bugtraq&m=132828103218869&w=2 - () http://marc.info/?l=bugtraq&m=132828103218869&w=2 -
References () http://openssl.org/news/secadv_20101116.txt - Patch, Vendor Advisory () http://openssl.org/news/secadv_20101116.txt - Patch, Vendor Advisory
References () http://secunia.com/advisories/42241 - () http://secunia.com/advisories/42241 -
References () http://secunia.com/advisories/42243 - Vendor Advisory () http://secunia.com/advisories/42243 - Vendor Advisory
References () http://secunia.com/advisories/42309 - () http://secunia.com/advisories/42309 -
References () http://secunia.com/advisories/42336 - () http://secunia.com/advisories/42336 -
References () http://secunia.com/advisories/42352 - () http://secunia.com/advisories/42352 -
References () http://secunia.com/advisories/42397 - () http://secunia.com/advisories/42397 -
References () http://secunia.com/advisories/42413 - () http://secunia.com/advisories/42413 -
References () http://secunia.com/advisories/43312 - () http://secunia.com/advisories/43312 -
References () http://secunia.com/advisories/44269 - () http://secunia.com/advisories/44269 -
References () http://secunia.com/advisories/57353 - () http://secunia.com/advisories/57353 -
References () http://security.FreeBSD.org/advisories/FreeBSD-SA-10:10.openssl.asc - () http://security.FreeBSD.org/advisories/FreeBSD-SA-10:10.openssl.asc -
References () http://securitytracker.com/id?1024743 - Patch () http://securitytracker.com/id?1024743 - Patch
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668793 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668793 -
References () http://support.apple.com/kb/HT4723 - () http://support.apple.com/kb/HT4723 -
References () http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 - () http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 -
References () http://www.adobe.com/support/security/bulletins/apsb11-11.html - () http://www.adobe.com/support/security/bulletins/apsb11-11.html -
References () http://www.debian.org/security/2010/dsa-2125 - () http://www.debian.org/security/2010/dsa-2125 -
References () http://www.kb.cert.org/vuls/id/737740 - US Government Resource () http://www.kb.cert.org/vuls/id/737740 - US Government Resource
References () http://www.securityfocus.com/archive/1/516397/100/0/threaded - () http://www.securityfocus.com/archive/1/516397/100/0/threaded -
References () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - () http://www.vmware.com/security/advisories/VMSA-2011-0003.html -
References () http://www.vupen.com/english/advisories/2010/3041 - () http://www.vupen.com/english/advisories/2010/3041 -
References () http://www.vupen.com/english/advisories/2010/3077 - () http://www.vupen.com/english/advisories/2010/3077 -
References () http://www.vupen.com/english/advisories/2010/3097 - () http://www.vupen.com/english/advisories/2010/3097 -
References () http://www.vupen.com/english/advisories/2010/3121 - () http://www.vupen.com/english/advisories/2010/3121 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=649304 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=649304 - Patch
References () https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html - () https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html -
References () https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html - () https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html -
References () https://rhn.redhat.com/errata/RHSA-2010-0888.html - () https://rhn.redhat.com/errata/RHSA-2010-0888.html -

Information

Published : 2010-11-17 16:00

Updated : 2024-11-21 01:19


NVD link : CVE-2010-3864

Mitre link : CVE-2010-3864

CVE.ORG link : CVE-2010-3864


JSON object : View

Products Affected

openssl

  • openssl
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')