[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1970-1 openssl -- denial of service

ID: oval:org.secpod.oval:def:600045Date: (C)2011-01-28   (M)2024-01-29
Class: PATCHFamily: unix




It was discovered that a significant memory leak could occur in openssl, related to the reinitialization of zlib. This could result in a remotely exploitable denial of service vulnerability when using the Apache httpd server in a configuration where mod_ssl, mod_php5, and the php5-curl extension are loaded. The old stable distribution is not affected by this issue. For the stable distribution , this problem has been fixed in version 0.9.8g-15+lenny6. The packages for the arm architecture are not included in this advisory. They will be released as soon as they become available. For the testing distribution and the unstable distribution , this problem will be fixed soon. The issue does not seem to be exploitable with the apache2 package contained in squeeze/sid. We recommend that you upgrade your openssl packages. You also need to restart your Apache httpd server to make sure it uses the updated libraries.

Platform:
Debian 5.0
Product:
openssl
Reference:
DSA-1970-1
CVE-2009-4355
CVE    1
CVE-2009-4355
CPE    1
cpe:/o:debian:debian_linux:5.0

© SecPod Technologies