search menu icon-carat-right cmu-wordmark

CERT Coordination Center

OpenSSL SSLv2 client code fails to properly check for NULL

Vulnerability Note VU#386964

Original Release Date: 2006-09-28 | Last Revised: 2011-07-22

Overview

A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application.

Description

The OpenSSL toolkit implements the Secure Sockets Layer (SSL versions 2 and 3) and Transport Layer Security (TLS version 1) protocols as well as a general purpose cryptographic library. A missing check for NULL exists in the SSLv2 client get_server_hello() function. As a result, an affected client application using OpenSSL to create an SSLv2 connection to a malicious server could be caused to crash.

Impact

A remote attacker could cause an affected client application to crash, creating a denial of service.

Solution

Upgrade or apply a patch from the vendor

Patches have been released to address this issue. Please see the Systems Affected section of this document for more information.

Users or redistributors who compile OpenSSL from the original source code distribution are encouraged to review OpenSSL Security Advisory [28th September 2006] and upgrade to the appropriate fixed version of the software.

Vendor Information

386964
 

View all 125 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Tavis Ormandy and Will Drewry of the Google Security Team for reporting this vulnerability.

This document was written by Chad R Dougherty.

Other Information

CVE IDs: CVE-2006-4343
Severity Metric: 0.32
Date Public: 2006-09-28
Date First Published: 2006-09-28
Date Last Updated: 2011-07-22 12:51 UTC
Document Revision: 31

Sponsored by CISA.