Korean
<< Back
VID 22553
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description According to its banner, the remote web server is running a version of OpenSSL 0.9.8 earlier than 0.9.8x. As such, the OpenSSL library itself is reportedly affected by a denial of service vulnerability.

An integer underflow error exists in the file 'ssl/d1_enc.c' in the function 'dtls1_enc'. When in CBC mode, TLS/DTLS record length values and explicit initialization vector length values related to TLS/DTLS packets are not handled properly, which can lead to memory corruption and application crashes.

* References:
http://openssl.org/news/secadv_20120510.txt
http://www.openssl.org/news/changelog.html
http://cvs.openssl.org/chngview?cn=22547
https://bugzilla.redhat.com/show_bug.cgi?id=820686


* Platforms Affected:
OpenSSL 0.9.8 before 0.9.8x
Recommendation Upgrade to the latest version of OpenSSL (0.9.8x or later), available from the OpenSSL Web site at http://www.openssl.org/
Related URL CVE-2012-2333 (CVE)
Related URL 53476 (SecurityFocus)
Related URL (ISS)