[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-0891

Date: (C)2008-05-29   (M)2017-08-08 


Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.

CVSS Score: 4.3Access Vector: NETWORK
Exploit Score: 8.6Access Complexity: MEDIUM
Impact Score: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL





Reference:
SECTRACK-1020121
BID-29405
SECUNIA-30405
SECUNIA-30460
SECUNIA-30825
SECUNIA-30852
SECUNIA-30868
SECUNIA-31228
SECUNIA-31288
ADV-2008-1680
ADV-2008-1937
FEDORA-2008-4723
GLSA-200806-08
MDVSA-2008:107
SSA:2008-210-08
USN-620-1
VU#661475
http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html
http://sourceforge.net/project/shownotes.php?release_id=615606
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738400
http://www.openssl.org/news/secadv_20080528.txt
openssl-servername-dos(42666)

CPE    2
cpe:/a:openssl:openssl:0.9.8g
cpe:/a:openssl:openssl:0.9.8f
CWE    1
CWE-189
OVAL    4
oval:org.secpod.oval:def:20016
oval:org.secpod.oval:def:301556
oval:org.secpod.oval:def:102023
oval:org.secpod.oval:def:101675
...

© 2013 SecPod Technologies