Overview
A vulnerability exists in OpenSSL that may allow a remote attacker to cause a denial of service.
Description
OpenSSL contains a vulnerability in the way server name extension data is handled that may result in a denial of service. According to OpenSSL Security Advisory [28-Mar-2008]: If OpenSSL has been compiled using the non-default TLS server name extensions, a remote attacker could send a carefully crafted packet to a server application using OpenSSL and cause it to crash. |
Impact
A remote, unauthorized attacker may be able to cause a denial of service. |
Solution
Upgrade or Apply Patch |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 0 | AV:--/AC:--/Au:--/C:--/I:--/A:-- |
Temporal | 0 | E:ND/RL:ND/RC:ND |
Environmental | 0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
This issue was reported in OpenSSL Security Advisory [28-Mar-2008]. OpenSSL credits Codenomicon for reporting these issues.
This document was written by Chris Taschner.
Other Information
CVE IDs: | CVE-2008-0891 |
Severity Metric: | 14.88 |
Date Public: | 2008-05-28 |
Date First Published: | 2008-05-30 |
Date Last Updated: | 2008-05-30 15:35 UTC |
Document Revision: | 9 |