CVE-2012-0050

OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108.
References
Link Resource
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc
http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03169289
http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03169289
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
http://marc.info/?l=bugtraq&m=133951357207000&w=2
http://marc.info/?l=bugtraq&m=133951357207000&w=2
http://marc.info/?l=bugtraq&m=134039053214295&w=2
http://marc.info/?l=bugtraq&m=134039053214295&w=2
http://osvdb.org/78320
http://secunia.com/advisories/47631
http://secunia.com/advisories/47677
http://secunia.com/advisories/47755
http://secunia.com/advisories/48528
http://secunia.com/advisories/57353
http://support.apple.com/kb/HT5784
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
http://www.debian.org/security/2012/dsa-2392
http://www.mandriva.com/security/advisories?name=MDVSA-2012:011
http://www.openssl.org/news/secadv_20120118.txt Vendor Advisory
http://www.securityfocus.com/bid/51563
http://www.securitytracker.com/id?1026548
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc
http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03169289
http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03169289
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
http://marc.info/?l=bugtraq&m=133951357207000&w=2
http://marc.info/?l=bugtraq&m=133951357207000&w=2
http://marc.info/?l=bugtraq&m=134039053214295&w=2
http://marc.info/?l=bugtraq&m=134039053214295&w=2
http://osvdb.org/78320
http://secunia.com/advisories/47631
http://secunia.com/advisories/47677
http://secunia.com/advisories/47755
http://secunia.com/advisories/48528
http://secunia.com/advisories/57353
http://support.apple.com/kb/HT5784
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
http://www.debian.org/security/2012/dsa-2392
http://www.mandriva.com/security/advisories?name=MDVSA-2012:011
http://www.openssl.org/news/secadv_20120118.txt Vendor Advisory
http://www.securityfocus.com/bid/51563
http://www.securitytracker.com/id?1026548
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*

History

21 Nov 2024, 01:34

Type Values Removed Values Added
References () http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc - () http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc -
References () http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03169289 - () http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03169289 -
References () http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html - () http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html -
References () http://marc.info/?l=bugtraq&m=133951357207000&w=2 - () http://marc.info/?l=bugtraq&m=133951357207000&w=2 -
References () http://marc.info/?l=bugtraq&m=134039053214295&w=2 - () http://marc.info/?l=bugtraq&m=134039053214295&w=2 -
References () http://osvdb.org/78320 - () http://osvdb.org/78320 -
References () http://secunia.com/advisories/47631 - () http://secunia.com/advisories/47631 -
References () http://secunia.com/advisories/47677 - () http://secunia.com/advisories/47677 -
References () http://secunia.com/advisories/47755 - () http://secunia.com/advisories/47755 -
References () http://secunia.com/advisories/48528 - () http://secunia.com/advisories/48528 -
References () http://secunia.com/advisories/57353 - () http://secunia.com/advisories/57353 -
References () http://support.apple.com/kb/HT5784 - () http://support.apple.com/kb/HT5784 -
References () http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 - () http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 -
References () http://www.debian.org/security/2012/dsa-2392 - () http://www.debian.org/security/2012/dsa-2392 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2012:011 - () http://www.mandriva.com/security/advisories?name=MDVSA-2012:011 -
References () http://www.openssl.org/news/secadv_20120118.txt - Vendor Advisory () http://www.openssl.org/news/secadv_20120118.txt - Vendor Advisory
References () http://www.securityfocus.com/bid/51563 - () http://www.securityfocus.com/bid/51563 -
References () http://www.securitytracker.com/id?1026548 - () http://www.securitytracker.com/id?1026548 -

07 Nov 2023, 02:09

Type Values Removed Values Added
Summary OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108. OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108.

Information

Published : 2012-01-19 19:55

Updated : 2024-11-21 01:34


NVD link : CVE-2012-0050

Mitre link : CVE-2012-0050

CVE.ORG link : CVE-2012-0050


JSON object : View

Products Affected

openssl

  • openssl
CWE
CWE-399

Resource Management Errors