MEDIUM · 4.0

CVE-2010-5298

Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial...

Vulnerability Description

Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.

CVSS Score

4.0

MEDIUM

AV:N/AC:H/Au:N/C:N/I:P/A:P
Confidentiality
NONE
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
OpensslOpenssl<= 1.0.1g
MariadbMariadb>= 10.0.0, < 10.0.13
FedoraprojectFedora19
SuseLinux Enterprise Desktop12
SuseLinux Enterprise Server12
SuseLinux Enterprise Software Development Kit12
SuseLinux Enterprise Workstation Extension12

Related Weaknesses (CWE)

References

FAQ

What is CVE-2010-5298?

CVE-2010-5298 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial...

How severe is CVE-2010-5298?

CVE-2010-5298 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2010-5298?

Check the references section above for vendor advisories and patch information. Affected products include: Openssl Openssl, Mariadb Mariadb, Fedoraproject Fedora, Suse Linux Enterprise Desktop, Suse Linux Enterprise Server.