Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2009-4355
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:redhat:openssl:0.9.6-15:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:redhat:openssl:0.9.6b-3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:redhat:openssl:0.9.7a-2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:* |
Yes
|
- | - |
References
- https://bugzilla.redhat.com/show_bug.cgi?id=546707
- http://secunia.com/advisories/38175
- http://cvs.openssl.org/chngview?cn=19069
- http://secunia.com/advisories/38181
- http://secunia.com/advisories/38200
- https://issues.rpath.com/browse/RPL-3157
- http://www.debian.org/security/2010/dsa-1970
- http://cvs.openssl.org/chngview?cn=19068
- http://www.ubuntu.com/usn/USN-884-1
- http://www.openwall.com/lists/oss-security/2010/01/13/3
- http://www.vupen.com/english/advisories/2010/0124
- http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
- http://cvs.openssl.org/chngview?cn=19167
- https://rhn.redhat.com/errata/RHSA-2010-0095.html
- http://secunia.com/advisories/38761
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-securit
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:022
- http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004
- http://www.vupen.com/english/advisories/2010/0839
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html
- http://www.vupen.com/english/advisories/2010/0916
- http://secunia.com/advisories/39461
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html
- http://secunia.com/advisories/42724
- http://secunia.com/advisories/42733
- https://kb.bluecoat.com/index?page=content&id=SA50
- http://marc.info/?l=bugtraq&m=127128920008563&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1