OpenSSL TLS handshake Denial of Service

ID VU:520586
Type cert
Reporter CERT
Modified 2008-05-30T00:00:00



A vulnerability exists in OpenSSL that may allow a remote attacker to cause a denial of service.


OpenSSL contains a vulnerability in the way specially crafted TLS handshake packets are handled that may result in a denial of service. According to OpenSSL Security Advisory [28-Mar-2008]:

... if the 'Server Key exchange message' is omitted from a TLS handshake in OpenSSL 0.9.8f and OpenSSL 0.9.8g. If a client connects to a malicious server with particular cipher suites, the server could cause the client to crash.

Note that this issue may affect OpenSSL versions prior to 0.9.8h.


A remote, unauthorized attacker may be able to cause a denial of service.


Upgrade or Apply Patch
OpenSSL has issued an upgrade and a patch to address this issue. See OpenSSL Security Advisory [28-Mar-2008] for more information. OpenSSL is included in various Linux and UNIX distributions. Please consult the relevant documentation of your distribution to obtain the appropriate updates.

Systems Affected

Vendor| Status| Date Notified| Date Updated
OpenSSL| | -| 30 May 2008
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A


  • <>
  • <>
  • <>
  • <>


This issue was reported in OpenSSL Security Advisory [28-Mar-2008] . OpenSSL credits Codenomicon for reporting these issues.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2008-1672
  • Date Public: 28 May 2008
  • Date First Published: 30 May 2008
  • Date Last Updated: 30 May 2008
  • Severity Metric: 14.70
  • Document Revision: 8