The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
07 Feb 2024, 18:01
Type | Values Removed | Values Added |
---|---|---|
CPE |
Information
Published : 2009-06-04 16:30
Updated : 2024-02-28 11:21
NVD link : CVE-2009-1387
Mitre link : CVE-2009-1387
CVE.ORG link : CVE-2009-1387
JSON object : View
Products Affected
redhat
- openssl
canonical
- ubuntu_linux
openssl
- openssl
CWE
CWE-476
NULL Pointer Dereference