[Pkg-openssl-devel] Bug#532037: CVE-2009-138{6, 7}: Two OpenSSL DTLS remote DoS
Giuseppe Iuculano
giuseppe at iuculano.it
Fri Jun 5 22:10:53 UTC 2009
Package: openssl
Severity: serious
Tags: security
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for openssl.
CVE-2009-1386[0]:
| ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause
| a denial of service (NULL pointer dereference and daemon crash) via a
| DTLS ChangeCipherSpec packet that occurs before ClientHello.
CVE-2009-1387[1]:
| The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in
| OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial
| of service (NULL pointer dereference and daemon crash) via an
| out-of-sequence DTLS handshake message, related to a "fragment bug."
If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386
http://security-tracker.debian.net/tracker/CVE-2009-1386
http://rt.openssl.org/Ticket/Display.html?id=1679&user=guest&pass=guest
http://cvs.openssl.org/chngview?cn=17369
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387
http://security-tracker.debian.net/tracker/CVE-2009-1387
http://rt.openssl.org/Ticket/Display.html?id=1838&user=guest&pass=guest
http://cvs.openssl.org/chngview?cn=17958
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkopl+kACgkQNxpp46476apHCwCgkOZVb6btWoJtE+xgbtiKfefF
U2kAn3B3ScTrmgrx8Px6WAJAx2AQ0aep
=vFTu
-----END PGP SIGNATURE-----
More information about the Pkg-openssl-devel
mailing list