[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-5298

Date: (C)2014-04-15   (M)2017-11-16
 
CVSS Score: 4.0Access Vector: NETWORK
Exploitability Subscore: 4.9Access Complexity: HIGH
Impact Subscore: 4.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: PARTIAL











Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.

Reference:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
http://www.securityfocus.com/archive/1/archive/1/534161/100/0/threaded
http://seclists.org/fulldisclosure/2015/Apr/5
SECUNIA-58337
SECUNIA-58713
SECUNIA-58939
SECUNIA-58977
SECUNIA-59162
SECUNIA-59287
SECUNIA-59300
SECUNIA-59301
SECUNIA-59342
SECUNIA-59413
SECUNIA-59437
SECUNIA-59438
SECUNIA-59440
SECUNIA-59450
SECUNIA-59490
SECUNIA-59655
SECUNIA-59666
SECUNIA-59669
SECUNIA-59721
BID-66801
FEDORA-2014-9301
FEDORA-2014-9308
GLSA-201407-05
HPSBGN03068
HPSBHF03052
HPSBMU03051
HPSBMU03055
HPSBMU03056
HPSBMU03057
HPSBMU03062
HPSBMU03074
HPSBMU03076
IAVM:2014-A-0063
IAVM:2014-A-0083
IAVM:2014-A-0087
IAVM:2014-A-0089
IAVM:2014-A-0099
IAVM:2014-A-0100
IAVM:2014-A-0109
IAVM:2014-A-0110
IAVM:2014-A-0111
IAVM:2014-A-0115
IAVM:2014-B-0077
IAVM:2014-B-0078
IAVM:2014-B-0080
IAVM:2014-B-0085
IAVM:2014-B-0088
IAVM:2014-B-0089
IAVM:2014-B-0091
IAVM:2014-B-0092
IAVM:2014-B-0097
IAVM:2014-B-0101
IAVM:2014-B-0102
IAVM:2014-B-0103
MDVSA-2014:090
MDVSA-2015:062
SUSE-SU-2015:0743
http://www.openbsd.org/errata55.html#004_openssl
http://openwall.com/lists/oss-security/2014/04/13/1
http://advisories.mageia.org/MGASA-2014-0187.html
http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sig
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
http://packetstormsecurity.com/files/131271/VMware-Security-Advisory-2015-0003.html
http://support.citrix.com/article/CTX140876
http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup
http://www-01.ibm.com/support/docview.wss?uid=swg21673137
http://www-01.ibm.com/support/docview.wss?uid=swg21676035
http://www-01.ibm.com/support/docview.wss?uid=swg21676062
http://www-01.ibm.com/support/docview.wss?uid=swg21676419
http://www-01.ibm.com/support/docview.wss?uid=swg21676529
http://www-01.ibm.com/support/docview.wss?uid=swg21676655
http://www-01.ibm.com/support/docview.wss?uid=swg21676879
http://www-01.ibm.com/support/docview.wss?uid=swg21676889
http://www-01.ibm.com/support/docview.wss?uid=swg21677527
http://www-01.ibm.com/support/docview.wss?uid=swg21677695
http://www-01.ibm.com/support/docview.wss?uid=swg21677828
http://www-01.ibm.com/support/docview.wss?uid=swg21677836
http://www-01.ibm.com/support/docview.wss?uid=swg21678167
http://www-01.ibm.com/support/docview.wss?uid=swg21683332
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
http://www.blackberry.com/btsc/KB36051
http://www.fortiguard.com/advisory/FG-IR-14-018/
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
http://www.ibm.com/support/docview.wss?uid=swg21676356
http://www.ibm.com/support/docview.wss?uid=swg24037783
http://www.openssl.org/news/secadv_20140605.txt
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse
http://www.vmware.com/security/advisories/VMSA-2014-0006.html
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
https://kb.bluecoat.com/index?page=content&id=SA80
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
https://kc.mcafee.com/corporate/index?page=content&id=SB10075
https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest
https://rt.openssl.org/Ticket/Display.html?id=3265&user=guest&pass=guest
https://www.novell.com/support/kb/doc.php?id=7015271

CPE    107
cpe:/a:openssl:openssl:1.0.0h
cpe:/a:openssl:openssl:1.0.0g
cpe:/a:openssl:openssl:1.0.0j
cpe:/a:openssl:openssl:1.0.0i
...
CWE    1
CWE-362
OVAL    22
oval:org.secpod.oval:def:19930
oval:org.secpod.oval:def:21278
oval:org.secpod.oval:def:601270
oval:org.secpod.oval:def:701670
...

© 2013 SecPod Technologies