Vulnerability Description
Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openssl | Openssl | 0.9.8f |
Related Weaknesses (CWE)
References
- http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html
- http://secunia.com/advisories/30405Vendor Advisory
- http://secunia.com/advisories/30460
- http://secunia.com/advisories/30825
- http://secunia.com/advisories/30852
- http://secunia.com/advisories/30868
- http://secunia.com/advisories/31228
- http://secunia.com/advisories/31288
- http://security.gentoo.org/glsa/glsa-200806-08.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware
- http://sourceforge.net/project/shownotes.php?release_id=615606
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738400
- http://www.kb.cert.org/vuls/id/661475US Government Resource
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:107
- http://www.openssl.org/news/secadv_20080528.txt
FAQ
What is CVE-2008-0891?
CVE-2008-0891 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packe...
How severe is CVE-2008-0891?
CVE-2008-0891 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0891?
Check the references section above for vendor advisories and patch information. Affected products include: Openssl Openssl.