CVE-2010-0740

The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number. NOTE: some of these details are obtained from third party information.
References
Link Resource
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html
http://marc.info/?l=bugtraq&m=127128920008563&w=2
http://marc.info/?l=bugtraq&m=127128920008563&w=2
http://marc.info/?l=bugtraq&m=127557640302499&w=2
http://marc.info/?l=bugtraq&m=127557640302499&w=2
http://secunia.com/advisories/39932
http://secunia.com/advisories/42724
http://secunia.com/advisories/42733
http://secunia.com/advisories/43311
http://support.apple.com/kb/HT4723
http://www.mandriva.com/security/advisories?name=MDVSA-2010:076
http://www.openssl.org/news/secadv_20100324.txt Patch Vendor Advisory
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://www.securitytracker.com/id?1023748
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
http://www.vupen.com/english/advisories/2010/0710 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/0839
http://www.vupen.com/english/advisories/2010/0933
http://www.vupen.com/english/advisories/2010/1216
https://kb.bluecoat.com/index?page=content&id=SA50
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11731
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html
http://marc.info/?l=bugtraq&m=127128920008563&w=2
http://marc.info/?l=bugtraq&m=127128920008563&w=2
http://marc.info/?l=bugtraq&m=127557640302499&w=2
http://marc.info/?l=bugtraq&m=127557640302499&w=2
http://secunia.com/advisories/39932
http://secunia.com/advisories/42724
http://secunia.com/advisories/42733
http://secunia.com/advisories/43311
http://support.apple.com/kb/HT4723
http://www.mandriva.com/security/advisories?name=MDVSA-2010:076
http://www.openssl.org/news/secadv_20100324.txt Patch Vendor Advisory
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://www.securitytracker.com/id?1023748
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
http://www.vupen.com/english/advisories/2010/0710 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/0839
http://www.vupen.com/english/advisories/2010/0933
http://www.vupen.com/english/advisories/2010/1216
https://kb.bluecoat.com/index?page=content&id=SA50
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11731
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*

History

21 Nov 2024, 01:12

Type Values Removed Values Added
References () http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc - () http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc -
References () http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html - () http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html -
References () http://marc.info/?l=bugtraq&m=127128920008563&w=2 - () http://marc.info/?l=bugtraq&m=127128920008563&w=2 -
References () http://marc.info/?l=bugtraq&m=127557640302499&w=2 - () http://marc.info/?l=bugtraq&m=127557640302499&w=2 -
References () http://secunia.com/advisories/39932 - () http://secunia.com/advisories/39932 -
References () http://secunia.com/advisories/42724 - () http://secunia.com/advisories/42724 -
References () http://secunia.com/advisories/42733 - () http://secunia.com/advisories/42733 -
References () http://secunia.com/advisories/43311 - () http://secunia.com/advisories/43311 -
References () http://support.apple.com/kb/HT4723 - () http://support.apple.com/kb/HT4723 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:076 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:076 -
References () http://www.openssl.org/news/secadv_20100324.txt - Patch, Vendor Advisory () http://www.openssl.org/news/secadv_20100324.txt - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/516397/100/0/threaded - () http://www.securityfocus.com/archive/1/516397/100/0/threaded -
References () http://www.securitytracker.com/id?1023748 - () http://www.securitytracker.com/id?1023748 -
References () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - () http://www.vmware.com/security/advisories/VMSA-2011-0003.html -
References () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html - () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -
References () http://www.vupen.com/english/advisories/2010/0710 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2010/0710 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/0839 - () http://www.vupen.com/english/advisories/2010/0839 -
References () http://www.vupen.com/english/advisories/2010/0933 - () http://www.vupen.com/english/advisories/2010/0933 -
References () http://www.vupen.com/english/advisories/2010/1216 - () http://www.vupen.com/english/advisories/2010/1216 -
References () https://kb.bluecoat.com/index?page=content&id=SA50 - () https://kb.bluecoat.com/index?page=content&id=SA50 -
References () https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html - () https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html -
References () https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html - () https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11731 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11731 -

07 Nov 2023, 02:05

Type Values Removed Values Added
Summary The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number. NOTE: some of these details are obtained from third party information. The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number. NOTE: some of these details are obtained from third party information.

Information

Published : 2010-03-26 18:30

Updated : 2024-11-21 01:12


NVD link : CVE-2010-0740

Mitre link : CVE-2010-0740

CVE.ORG link : CVE-2010-0740


JSON object : View

Products Affected

openssl

  • openssl
CWE
CWE-20

Improper Input Validation