Computer Security
[EN] securityvulns.ru no-pyccku


OpenSSL race conditions
updated since 01.05.2014
Published:05.05.2014
Source:
SecurityVulns ID:13690
Type:library
Threat Level:
7/10
Description:Race conditions lead to DoS or data injection.
Affected:OPENSSL : OpenSSL 1.0
CVE:CVE-2014-0198 (The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.)
 CVE-2010-5298 (Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.)
Original documentdocumentUBUNTU, [USN-2192-1] OpenSSL vulnerabilities (05.05.2014)
 documentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-14:09.openssl [REVISED] (01.05.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod