search menu icon-carat-right cmu-wordmark

CERT Coordination Center

OpenSSL does not properly handle unknown message types

Vulnerability Note VU#465542

Original Release Date: 2004-03-17 | Last Revised: 2005-05-06

Overview

OpenSSL does not properly handle unknown message types, allowing an unauthenticated, remote attacker to cause a denial of service. This vulnerability was addressed in OpenSSL 0.9.6d and 0.9.7.

Description

OpenSSL implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols and includes a general purpose cryptographic library. SSL and TLS are commonly used to provide authentication, encryption, integrity, and non-repudiation services to network applications such as HTTP, IMAP, POP3, LDAP, and others.

OpenSSL prior to version 0.9.6d does not properly handle unknown message types. An attacker could cause the application using OpenSSL to enter an infinite loop, resulting in a denial of service.

Further information is available in NISCC/224012/OpenSSL/3.

Impact

An unauthenticated, remote attacker could cause a denial of service in an application that uses OpenSSL.

Solution

Upgrade or Patch
This vulnerability was addressed in OpenSSL versions 0.9.6d and 0.9.7. Upgrade to OpenSSL version 0.9.6d or 0.9.7 greater. Alternatively, upgrade or apply a patch as specified by your vendor. Note that it is necessary to recompile any applications that are statically linked to OpenSSL libraries.

Vendor Information

465542
 

View all 83 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by the OpenSSL Project and the U.K. National Infrastructure Security Co-ordination Centre (NISCC).

This document was written by Damon Morda and Art Manion.

Other Information

CVE IDs: CVE-2004-0081
Severity Metric: 5.16
Date Public: 2004-03-17
Date First Published: 2004-03-17
Date Last Updated: 2005-05-06 17:31 UTC
Document Revision: 27

Sponsored by CISA.