The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:02
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-009.txt.asc - Broken Link, Third Party Advisory | |
References | () http://cvs.openssl.org/chngview?cn=17958 - Broken Link, Patch, Third Party Advisory, Vendor Advisory | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444 - Broken Link, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html - Third Party Advisory | |
References | () http://lists.vmware.com/pipermail/security-announce/2010/000082.html - Mailing List, Third Party Advisory | |
References | () http://rt.openssl.org/Ticket/Display.html?id=1838&user=guest&pass=guest - Broken Link, Patch, Third Party Advisory | |
References | () http://secunia.com/advisories/35571 - Third Party Advisory | |
References | () http://secunia.com/advisories/35685 - Third Party Advisory | |
References | () http://secunia.com/advisories/35729 - Third Party Advisory | |
References | () http://secunia.com/advisories/36533 - Third Party Advisory | |
References | () http://secunia.com/advisories/37003 - Third Party Advisory | |
References | () http://secunia.com/advisories/38794 - Third Party Advisory | |
References | () http://secunia.com/advisories/38834 - Third Party Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200912-01.xml - Third Party Advisory | |
References | () http://sourceforge.net/mailarchive/message.php?msg_name=4AD43807.7080105%40users.sourceforge.net - Broken Link | |
References | () http://voodoo-circle.sourceforge.net/sa/sa-20091012-01.html - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2009/06/02/1 - Mailing List, Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2009-1335.html - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-792-1 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0528 - Permissions Required, Third Party Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10740 - Tool Signature | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7592 - Tool Signature |
07 Feb 2024, 18:01
Type | Values Removed | Values Added |
---|---|---|
CPE |
Information
Published : 2009-06-04 16:30
Updated : 2024-11-21 01:02
NVD link : CVE-2009-1387
Mitre link : CVE-2009-1387
CVE.ORG link : CVE-2009-1387
JSON object : View
Products Affected
canonical
- ubuntu_linux
redhat
- openssl
openssl
- openssl
CWE
CWE-476
NULL Pointer Dereference