CVE-2009-4355

Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
References
Link Resource
http://cvs.openssl.org/chngview?cn=19068
http://cvs.openssl.org/chngview?cn=19069
http://cvs.openssl.org/chngview?cn=19167
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
http://marc.info/?l=bugtraq&m=127128920008563&w=2
http://marc.info/?l=bugtraq&m=127128920008563&w=2
http://secunia.com/advisories/38175 Vendor Advisory
http://secunia.com/advisories/38181 Vendor Advisory
http://secunia.com/advisories/38200 Vendor Advisory
http://secunia.com/advisories/38761
http://secunia.com/advisories/39461
http://secunia.com/advisories/42724
http://secunia.com/advisories/42733
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004
http://www.debian.org/security/2010/dsa-1970
http://www.mandriva.com/security/advisories?name=MDVSA-2010:022
http://www.openwall.com/lists/oss-security/2010/01/13/3
http://www.ubuntu.com/usn/USN-884-1 Vendor Advisory
http://www.vupen.com/english/advisories/2010/0124 Vendor Advisory
http://www.vupen.com/english/advisories/2010/0839
http://www.vupen.com/english/advisories/2010/0916
https://bugzilla.redhat.com/show_bug.cgi?id=546707
https://issues.rpath.com/browse/RPL-3157
https://kb.bluecoat.com/index?page=content&id=SA50
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11260
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12168
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6678
https://rhn.redhat.com/errata/RHSA-2010-0095.html
http://cvs.openssl.org/chngview?cn=19068
http://cvs.openssl.org/chngview?cn=19069
http://cvs.openssl.org/chngview?cn=19167
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
http://marc.info/?l=bugtraq&m=127128920008563&w=2
http://marc.info/?l=bugtraq&m=127128920008563&w=2
http://secunia.com/advisories/38175 Vendor Advisory
http://secunia.com/advisories/38181 Vendor Advisory
http://secunia.com/advisories/38200 Vendor Advisory
http://secunia.com/advisories/38761
http://secunia.com/advisories/39461
http://secunia.com/advisories/42724
http://secunia.com/advisories/42733
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004
http://www.debian.org/security/2010/dsa-1970
http://www.mandriva.com/security/advisories?name=MDVSA-2010:022
http://www.openwall.com/lists/oss-security/2010/01/13/3
http://www.ubuntu.com/usn/USN-884-1 Vendor Advisory
http://www.vupen.com/english/advisories/2010/0124 Vendor Advisory
http://www.vupen.com/english/advisories/2010/0839
http://www.vupen.com/english/advisories/2010/0916
https://bugzilla.redhat.com/show_bug.cgi?id=546707
https://issues.rpath.com/browse/RPL-3157
https://kb.bluecoat.com/index?page=content&id=SA50
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11260
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12168
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6678
https://rhn.redhat.com/errata/RHSA-2010-0095.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.6-15:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.6b-3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.7a-2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*

History

21 Nov 2024, 01:09

Type Values Removed Values Added
References () http://cvs.openssl.org/chngview?cn=19068 - () http://cvs.openssl.org/chngview?cn=19068 -
References () http://cvs.openssl.org/chngview?cn=19069 - () http://cvs.openssl.org/chngview?cn=19069 -
References () http://cvs.openssl.org/chngview?cn=19167 - () http://cvs.openssl.org/chngview?cn=19167 -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html - () http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html -
References () http://marc.info/?l=bugtraq&m=127128920008563&w=2 - () http://marc.info/?l=bugtraq&m=127128920008563&w=2 -
References () http://secunia.com/advisories/38175 - Vendor Advisory () http://secunia.com/advisories/38175 - Vendor Advisory
References () http://secunia.com/advisories/38181 - Vendor Advisory () http://secunia.com/advisories/38181 - Vendor Advisory
References () http://secunia.com/advisories/38200 - Vendor Advisory () http://secunia.com/advisories/38200 - Vendor Advisory
References () http://secunia.com/advisories/38761 - () http://secunia.com/advisories/38761 -
References () http://secunia.com/advisories/39461 - () http://secunia.com/advisories/39461 -
References () http://secunia.com/advisories/42724 - () http://secunia.com/advisories/42724 -
References () http://secunia.com/advisories/42733 - () http://secunia.com/advisories/42733 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049 -
References () http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004 - () http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004 -
References () http://www.debian.org/security/2010/dsa-1970 - () http://www.debian.org/security/2010/dsa-1970 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:022 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:022 -
References () http://www.openwall.com/lists/oss-security/2010/01/13/3 - () http://www.openwall.com/lists/oss-security/2010/01/13/3 -
References () http://www.ubuntu.com/usn/USN-884-1 - Vendor Advisory () http://www.ubuntu.com/usn/USN-884-1 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/0124 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/0124 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/0839 - () http://www.vupen.com/english/advisories/2010/0839 -
References () http://www.vupen.com/english/advisories/2010/0916 - () http://www.vupen.com/english/advisories/2010/0916 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=546707 - () https://bugzilla.redhat.com/show_bug.cgi?id=546707 -
References () https://issues.rpath.com/browse/RPL-3157 - () https://issues.rpath.com/browse/RPL-3157 -
References () https://kb.bluecoat.com/index?page=content&id=SA50 - () https://kb.bluecoat.com/index?page=content&id=SA50 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11260 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11260 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12168 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12168 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6678 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6678 -
References () https://rhn.redhat.com/errata/RHSA-2010-0095.html - () https://rhn.redhat.com/errata/RHSA-2010-0095.html -

Information

Published : 2010-01-14 19:30

Updated : 2024-11-21 01:09


NVD link : CVE-2009-4355

Mitre link : CVE-2009-4355

CVE.ORG link : CVE-2009-4355


JSON object : View

Products Affected

redhat

  • openssl

openssl

  • openssl
CWE
CWE-399

Resource Management Errors