Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 02:01
Type | Values Removed | Values Added |
---|---|---|
Summary | Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information. |
13 Feb 2023, 02:18
Type | Values Removed | Values Added |
---|---|---|
Summary | Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information. |
Information
Published : 2008-05-29 16:32
Updated : 2023-12-10 10:51
NVD link : CVE-2008-0891
Mitre link : CVE-2008-0891
CVE.ORG link : CVE-2008-0891
JSON object : View
Products Affected
openssl
- openssl
CWE
CWE-189
Numeric Errors