Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux SE 1.5
Astra Linux SE 1.6
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:13891
[Rus]
Version
9
Class
patch
ALTXid
27921
Language
English
Severity
NotAvailable
Title
USN-792-1 -- openssl vulnerabilities
Description
It was discovered that OpenSSL did not limit the number of DTLS records it would buffer when they arrived with a future epoch. A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests. It was discovered that OpenSSL did not properly free memory when processing DTLS fragments. A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests. It was discovered that OpenSSL did not properly handle certain server certificates when processing DTLS packets. A remote DTLS server could cause a denial of service by sending a message containing a specially crafted server certificate. It was discovered that OpenSSL did not properly handle a DTLS ChangeCipherSpec packet when it occured before ClientHello. A remote attacker could cause a denial of service by sending a specially crafted request. It was discovered that OpenSSL did not properly handle out of sequence DTLS handshake messages. A remote attacker could cause a denial of service by sending a specially crafted request
Family
unix
Platform
Ubuntu 6.06
Ubuntu 8.04
Ubuntu 8.10
Ubuntu 9.04
Product
openssl
Reference
VENDOR: USN-792-1
VENDOR: USN-792-1
Id:
USN-792-1
Reference:
https://usn.ubuntu.com/usn/usn-792-1
CVE: CVE-2009-1387
CVE: CVE-2009-1387
Id:
CVE-2009-1387
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387
Comment
: The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
476 (NULL Pointer Dereference)
References:
http://cvs.openssl.org/chngview?cn=17958 (CONFIRM)
http://rt.openssl.org/Ticket/Display.html?id=1838&user=guest&pass=guest (CONFIRM)
[oss-security] 20090602 Re: Two OpenSSL DTLS remote DoS (MLIST)
USN-792-1 (UBUNTU)
SUSE-SR:2009:012 (SUSE)
35571 (SECUNIA)
35685 (SECUNIA)
35729 (SECUNIA)
NetBSD-SA2009-009 (NETBSD)
http://sourceforge.net/mailarchive/message.php?msg_name=4AD43807.7080105%40users.sourceforge.net (CONFIRM)
37003 (SECUNIA)
http://voodoo-circle.sourceforge.net/sa/sa-20091012-01.html (CONFIRM)
GLSA-200912-01 (GENTOO)
HPSBMA02492 (HP)
38794 (SECUNIA)
[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates (MLIST)
38834 (SECUNIA)
ADV-2010-0528 (VUPEN)
36533 (SECUNIA)
RHSA-2009:1335 (REDHAT)
oval:org.mitre.oval:def:7592 (OVAL)
oval:org.mitre.oval:def:10740 (OVAL)
CVE: CVE-2009-1386
CVE: CVE-2009-1386
Id:
CVE-2009-1386
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386
Comment
: ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
476 (NULL Pointer Dereference)
References:
35174 (BID)
http://cvs.openssl.org/chngview?cn=17369 (CONFIRM)
http://rt.openssl.org/Ticket/Display.html?id=1679&user=guest&pass=guest (CONFIRM)
[oss-security] 20090602 Re: Two OpenSSL DTLS remote DoS (MLIST)
USN-792-1 (UBUNTU)
SUSE-SR:2009:012 (SUSE)
35571 (SECUNIA)
NetBSD-SA2009-009 (NETBSD)
35685 (SECUNIA)
35729 (SECUNIA)
HPSBMA02492 (HP)
38794 (SECUNIA)
[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates (MLIST)
ADV-2010-0528 (VUPEN)
38834 (SECUNIA)
36533 (SECUNIA)
RHSA-2009:1335 (REDHAT)
openssl-changecipherspec-dos(50963) (XF)
8873 (EXPLOIT-DB)
oval:org.mitre.oval:def:7469 (OVAL)
oval:org.mitre.oval:def:11179 (OVAL)
CVE: CVE-2009-1379
CVE: CVE-2009-1379
Id:
CVE-2009-1379
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379
Comment
: Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
399 (Resource Management Errors)
References:
http://rt.openssl.org/Ticket/Display.html?id=1923&user=guest&pass=guest (CONFIRM)
[oss-security] 20090518 Re: Two OpenSSL DTLS remote DoS (MLIST)
https://launchpad.net/bugs/cve/2009-1379 (MISC)
1022241 (SECTRACK)
ADV-2009-1377 (VUPEN)
35138 (BID)
SUSE-SR:2009:011 (SUSE)
35416 (SECUNIA)
35461 (SECUNIA)
USN-792-1 (UBUNTU)
35571 (SECUNIA)
35729 (SECUNIA)
NetBSD-SA2009-009 (NETBSD)
37003 (SECUNIA)
http://voodoo-circle.sourceforge.net/sa/sa-20091012-01.html (CONFIRM)
http://sourceforge.net/mailarchive/message.php?msg_name=4AD43807.7080105%40users.sourceforge.net (CONFIRM)
GLSA-200912-01 (GENTOO)
SSA:2010-060-02 (SLACKWARE)
38761 (SECUNIA)
HPSBMA02492 (HP)
38794 (SECUNIA)
ADV-2010-0528 (VUPEN)
[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates (MLIST)
38834 (SECUNIA)
https://kb.bluecoat.com/index?page=content&id=SA50 (CONFIRM)
42724 (SECUNIA)
42733 (SECUNIA)
RHSA-2009:1335 (REDHAT)
36533 (SECUNIA)
openssl-dtls1retrievebufferedfragment-dos(50661) (XF)
oval:org.mitre.oval:def:9744 (OVAL)
oval:org.mitre.oval:def:6848 (OVAL)
CVE: CVE-2009-1378
CVE: CVE-2009-1378
Id:
CVE-2009-1378
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378
Comment
: Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
401 (Improper Release of Memory Before Removing Last Reference ('Memory Leak'))
References:
35001 (BID)
[openssl-dev] 20090518 Re: [openssl.org #1931] [PATCH] DTLS fragment handling memory leak (MLIST)
https://launchpad.net/bugs/cve/2009-1378 (MISC)
35128 (SECUNIA)
[oss-security] 20090518 Two OpenSSL DTLS remote DoS (MLIST)
[openssl-dev] 20090516 [openssl.org #1931] [PATCH] DTLS fragment handling memory leak (MLIST)
http://cvs.openssl.org/chngview?cn=18188 (CONFIRM)
http://rt.openssl.org/Ticket/Display.html?id=1931&user=guest&pass=guest (CONFIRM)
MDVSA-2009:120 (MANDRIVA)
ADV-2009-1377 (VUPEN)
1022241 (SECTRACK)
SUSE-SR:2009:011 (SUSE)
35416 (SECUNIA)
35461 (SECUNIA)
USN-792-1 (UBUNTU)
35571 (SECUNIA)
NetBSD-SA2009-009 (NETBSD)
35729 (SECUNIA)
http://voodoo-circle.sourceforge.net/sa/sa-20091012-01.html (CONFIRM)
37003 (SECUNIA)
http://sourceforge.net/mailarchive/message.php?msg_name=4AD43807.7080105%40users.sourceforge.net (CONFIRM)
GLSA-200912-01 (GENTOO)
38761 (SECUNIA)
SSA:2010-060-02 (SLACKWARE)
SSRT100079 (HP)
38834 (SECUNIA)
[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates (MLIST)
38794 (SECUNIA)
ADV-2010-0528 (VUPEN)
https://kb.bluecoat.com/index?page=content&id=SA50 (CONFIRM)
42724 (SECUNIA)
42733 (SECUNIA)
RHSA-2009:1335 (REDHAT)
36533 (SECUNIA)
8720 (EXPLOIT-DB)
oval:org.mitre.oval:def:7229 (OVAL)
oval:org.mitre.oval:def:11309 (OVAL)
CVE: CVE-2009-1377
CVE: CVE-2009-1377
Id:
CVE-2009-1377
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377
Comment
: The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
35001 (BID)
35128 (SECUNIA)
https://launchpad.net/bugs/cve/2009-1377 (MISC)
[oss-security] 20090518 Two OpenSSL DTLS remote DoS (MLIST)
http://cvs.openssl.org/chngview?cn=18187 (CONFIRM)
http://rt.openssl.org/Ticket/Display.html?id=1930&user=guest&pass=guest (CONFIRM)
[openssl-dev] 20090516 [openssl.org #1930] [PATCH] DTLS record buffer limitation bug (MLIST)
1022241 (SECTRACK)
MDVSA-2009:120 (MANDRIVA)
ADV-2009-1377 (VUPEN)
SUSE-SR:2009:011 (SUSE)
35416 (SECUNIA)
35461 (SECUNIA)
USN-792-1 (UBUNTU)
35571 (SECUNIA)
35729 (SECUNIA)
NetBSD-SA2009-009 (NETBSD)
37003 (SECUNIA)
http://sourceforge.net/mailarchive/message.php?msg_name=4AD43807.7080105%40users.sourceforge.net (CONFIRM)
http://voodoo-circle.sourceforge.net/sa/sa-20091012-01.html (CONFIRM)
GLSA-200912-01 (GENTOO)
SSA:2010-060-02 (SLACKWARE)
38761 (SECUNIA)
HPSBMA02492 (HP)
38794 (SECUNIA)
38834 (SECUNIA)
ADV-2010-0528 (VUPEN)
[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates (MLIST)
https://kb.bluecoat.com/index?page=content&id=SA50 (CONFIRM)
42724 (SECUNIA)
42733 (SECUNIA)
RHSA-2009:1335 (REDHAT)
36533 (SECUNIA)
oval:org.mitre.oval:def:9663 (OVAL)
oval:org.mitre.oval:def:6683 (OVAL)
Content available only for registered users!
ovaldb@altx-soft.com