openssl
Page content
- Vulnerable: 0.9.8-11
- Unaffected: 0.9.8-12kalgan1
Two vulnerabilities have been reported in OpenSSL, which can be exploited by malicious people to cause a DoS (Denial of Service).
- A double-free error in the handling of server name extension data if “server_name” set to 0x00 can be exploited to crash a server application using OpenSSL by sending a specially crafted TLS 1.0 Client Hello packet. Successful exploitation requires that OpenSSL is compiled using the TLS server name extensions.
- A NULL pointer dereference error can be exploited by a malicious server to crash a client application when the “Server Key exchange message” is omitted from a TLS handshake and anonymous Diffie-Hellman key exchange is used.
- Bug Tracker URL: http://bugs.frugalware.org/task/3114