[Secure-testing-team] Bug#532037: CVE-2009-138{6, 7}: Two OpenSSL DTLS remote DoS

Giuseppe Iuculano giuseppe at iuculano.it
Fri Jun 5 22:10:53 UTC 2009


Package: openssl
Severity: serious
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for openssl.

CVE-2009-1386[0]:
| ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause
| a denial of service (NULL pointer dereference and daemon crash) via a
| DTLS ChangeCipherSpec packet that occurs before ClientHello.

CVE-2009-1387[1]:
| The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in
| OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial
| of service (NULL pointer dereference and daemon crash) via an
| out-of-sequence DTLS handshake message, related to a "fragment bug."

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386
    http://security-tracker.debian.net/tracker/CVE-2009-1386
    http://rt.openssl.org/Ticket/Display.html?id=1679&user=guest&pass=guest
    http://cvs.openssl.org/chngview?cn=17369
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387
    http://security-tracker.debian.net/tracker/CVE-2009-1387
    http://rt.openssl.org/Ticket/Display.html?id=1838&user=guest&pass=guest
    http://cvs.openssl.org/chngview?cn=17958



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkopl+kACgkQNxpp46476apHCwCgkOZVb6btWoJtE+xgbtiKfefF
U2kAn3B3ScTrmgrx8Px6WAJAx2AQ0aep
=vFTu
-----END PGP SIGNATURE-----





More information about the Secure-testing-team mailing list