8.8 High
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.132 Low
EPSS
Percentile
95.5%
Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.
CPE | Name | Operator | Version |
---|---|---|---|
openssl:openssl | openssl | eq | 0.9.8g |
openssl:openssl | openssl | eq | 0.9.8f |
cert.fi/haavoittuvuudet/2008/advisory-openssl.html
secunia.com/advisories/30405
secunia.com/advisories/30460
secunia.com/advisories/30825
secunia.com/advisories/30852
secunia.com/advisories/30868
secunia.com/advisories/31228
secunia.com/advisories/31288
security.gentoo.org/glsa/glsa-200806-08.xml
slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.562004
sourceforge.net/project/shownotes.php?release_id=615606
support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738400
www.kb.cert.org/vuls/id/661475
www.mandriva.com/security/advisories?name=MDVSA-2008:107
www.openssl.org/news/secadv_20080528.txt
www.securityfocus.com/bid/29405
www.securitytracker.com/id?1020121
www.ubuntu.com/usn/usn-620-1
www.vupen.com/english/advisories/2008/1680
www.vupen.com/english/advisories/2008/1937/references
exchange.xforce.ibmcloud.com/vulnerabilities/42666
www.redhat.com/archives/fedora-package-announce/2008-May/msg01029.html