Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://cvs.openssl.org/chngview?cn=19068 - | |
References | () http://cvs.openssl.org/chngview?cn=19069 - | |
References | () http://cvs.openssl.org/chngview?cn=19167 - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html - | |
References | () http://marc.info/?l=bugtraq&m=127128920008563&w=2 - | |
References | () http://secunia.com/advisories/38175 - Vendor Advisory | |
References | () http://secunia.com/advisories/38181 - Vendor Advisory | |
References | () http://secunia.com/advisories/38200 - Vendor Advisory | |
References | () http://secunia.com/advisories/38761 - | |
References | () http://secunia.com/advisories/39461 - | |
References | () http://secunia.com/advisories/42724 - | |
References | () http://secunia.com/advisories/42733 - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049 - | |
References | () http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004 - | |
References | () http://www.debian.org/security/2010/dsa-1970 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:022 - | |
References | () http://www.openwall.com/lists/oss-security/2010/01/13/3 - | |
References | () http://www.ubuntu.com/usn/USN-884-1 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0124 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0839 - | |
References | () http://www.vupen.com/english/advisories/2010/0916 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=546707 - | |
References | () https://issues.rpath.com/browse/RPL-3157 - | |
References | () https://kb.bluecoat.com/index?page=content&id=SA50 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11260 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12168 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6678 - | |
References | () https://rhn.redhat.com/errata/RHSA-2010-0095.html - |
Information
Published : 2010-01-14 19:30
Updated : 2024-11-21 01:09
NVD link : CVE-2009-4355
Mitre link : CVE-2009-4355
CVE.ORG link : CVE-2009-4355
JSON object : View
Products Affected
redhat
- openssl
openssl
- openssl
CWE
CWE-399
Resource Management Errors