Vulnerability Description
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openssl | Openssl | <= 1.0.1g |
| Mariadb | Mariadb | >= 10.0.0, < 10.0.13 |
| Fedoraproject | Fedora | 19 |
| Suse | Linux Enterprise Desktop | 12 |
| Suse | Linux Enterprise Server | 12 |
| Suse | Linux Enterprise Software Development Kit | 12 |
| Suse | Linux Enterprise Workstation Extension | 12 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2014-0187.htmlThird Party Advisory
- http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sigPatchThird Party Advisory
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629Third Party Advisory
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195Permissions Required
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.htmlMailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=140389274407904&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=140389355508263&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=140431828824371&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=140448122410568&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=140544599631400&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=140621259019789&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=140752315422991&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=140904544427729&w=2Mailing ListThird Party Advisory
FAQ
What is CVE-2010-5298?
CVE-2010-5298 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial...
How severe is CVE-2010-5298?
CVE-2010-5298 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-5298?
Check the references section above for vendor advisories and patch information. Affected products include: Openssl Openssl, Mariadb Mariadb, Fedoraproject Fedora, Suse Linux Enterprise Desktop, Suse Linux Enterprise Server.