[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97147

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2162-1 openssl -- invalid memory access

ID: oval:org.secpod.oval:def:600187Date: (C)2011-03-10   (M)2017-11-18
Class: PATCHFamily: unix




Neel Mehta discovered that an incorrectly formatted ClientHello handshake message could cause OpenSSL to parse past the end of the message. This allows an attacker to crash an application using OpenSSL by triggering an invalid memory access. Additionally, some applications may be vulnerable to expose contents of a parsed OCSP nonce extension. Packages in the oldstable distribution are not affected by this problem.

Platform:
Debian 6.0
Product:
openssl
Reference:
DSA-2162-1
CVE-2011-0014
CVE    1
CVE-2011-0014
CPE    21
cpe:/o:debian:debian_linux:6.0
cpe:/a:openssl:openssl:0.9.8h
cpe:/a:openssl:openssl:0.9.8i
cpe:/a:openssl:openssl:0.9.8j
...

© 2013 SecPod Technologies