Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2010-0740
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number. NOTE: some of these details are obtained from third party information..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.openssl.org/news/secadv_20100324.txt
- http://www.vupen.com/english/advisories/2010/0710
- http://www.securitytracker.com/id?1023748
- http://www.vupen.com/english/advisories/2010/0839
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html
- http://www.vupen.com/english/advisories/2010/0933
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:076
- http://www.vupen.com/english/advisories/2010/1216
- http://secunia.com/advisories/39932
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc
- https://kb.bluecoat.com/index?page=content&id=SA50
- http://secunia.com/advisories/42733
- http://secunia.com/advisories/42724
- http://www.vmware.com/security/advisories/VMSA-2011-0003.html
- http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
- https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
- https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
- http://secunia.com/advisories/43311
- http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
- http://support.apple.com/kb/HT4723
- http://marc.info/?l=bugtraq&m=127128920008563&w=2
- http://marc.info/?l=bugtraq&m=127557640302499&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1
- http://www.securityfocus.com/archive/1/516397/100/0/threaded