ID CVE-2008-1672
Summary OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference.
References
Vulnerable Configurations
  • cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
CVSS
Base: 4.3 (as of 02-02-2022 - 15:03)
Impact:
Exploitability:
CWE CWE-476
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:P
refmap via4
bid 29405
bugtraq 20080602 rPSA-2008-0181-1 openssl openssl-scripts
cert-vn VU#520586
confirm
fedora FEDORA-2008-4723
gentoo GLSA-200806-08
mandriva MDVSA-2008:107
misc
sectrack 1020122
secunia
  • 30405
  • 30460
  • 30825
  • 30852
  • 30868
  • 31228
  • 31288
slackware SSA:2008-210-08
ubuntu USN-620-1
vupen
  • ADV-2008-1680
  • ADV-2008-1937
xf openssl-serverkey-dos(42667)
statements via4
contributor Mark J Cox
lastmodified 2008-05-30
organization Red Hat
statement Not vulnerable. This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
Last major update 02-02-2022 - 15:03
Published 29-05-2008 - 16:32
Last modified 02-02-2022 - 15:03
Back to Top