CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
95.0%
ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka “OCSP stapling vulnerability.”
Vendor | Product | Version | CPE |
---|---|---|---|
openssl | openssl | 0.9.8h | cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:* |
openssl | openssl | 0.9.8i | cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:* |
openssl | openssl | 0.9.8j | cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:* |
openssl | openssl | 0.9.8k | cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:* |
openssl | openssl | 0.9.8l | cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:* |
openssl | openssl | 0.9.8m | cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:* |
openssl | openssl | 0.9.8n | cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:* |
openssl | openssl | 0.9.8o | cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:* |
openssl | openssl | 0.9.8p | cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:* |
openssl | openssl | 0.9.8q | cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:* |
ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2011-002.txt.asc
h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777
lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
lists.fedoraproject.org/pipermail/package-announce/2011-February/054007.html
lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
marc.info/?l=bugtraq&m=130497251507577&w=2
marc.info/?l=bugtraq&m=131042179515633&w=2
osvdb.org/70847
secunia.com/advisories/43227
secunia.com/advisories/43286
secunia.com/advisories/43301
secunia.com/advisories/43339
secunia.com/advisories/44269
secunia.com/advisories/57353
slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.668823
support.apple.com/kb/HT4723
www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
www.debian.org/security/2011/dsa-2162
www.mandriva.com/security/advisories?name=MDVSA-2011:028
www.openssl.org/news/secadv_20110208.txt
www.redhat.com/support/errata/RHSA-2011-0677.html
www.securityfocus.com/bid/46264
www.securitytracker.com/id?1025050
www.ubuntu.com/usn/USN-1064-1
www.vupen.com/english/advisories/2011/0361
www.vupen.com/english/advisories/2011/0387
www.vupen.com/english/advisories/2011/0389
www.vupen.com/english/advisories/2011/0395
www.vupen.com/english/advisories/2011/0399
www.vupen.com/english/advisories/2011/0603
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18985
support.f5.com/csp/article/K10534046