CVE-2010-2939

Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime. NOTE: some sources refer to this as a use-after-free issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*

History

07 Nov 2023, 02:05

Type Values Removed Values Added
Summary Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime. NOTE: some sources refer to this as a use-after-free issue. Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime. NOTE: some sources refer to this as a use-after-free issue.

13 Feb 2023, 03:19

Type Values Removed Values Added
Summary Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime. NOTE: some sources refer to this as a use-after-free issue. Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime. NOTE: some sources refer to this as a use-after-free issue.
References
  • {'url': 'http://www.mail-archive.com/openssl-dev@openssl.org/msg28049.html', 'name': '[openssl-dev] 20100808 Re: openssl-1.0.0a and glibc detected sthg ;)', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'http://www.mail-archive.com/openssl-dev@openssl.org/msg28043.html', 'name': '[openssl-dev] 20100807 openssl-1.0.0a and glibc detected sthg ;)', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'http://www.mail-archive.com/openssl-dev@openssl.org/msg28045.html', 'name': '[openssl-dev] 20100807 Re: openssl-1.0.0a and glibc detected sthg ;)', 'tags': [], 'refsource': 'MLIST'}
  • (MISC) http://www.mail-archive.com/openssl-dev%40openssl.org/msg28043.html -
  • (MISC) http://www.mail-archive.com/openssl-dev%40openssl.org/msg28049.html -
  • (MISC) http://www.mail-archive.com/openssl-dev%40openssl.org/msg28045.html -

Information

Published : 2010-08-17 20:00

Updated : 2023-12-10 11:03


NVD link : CVE-2010-2939

Mitre link : CVE-2010-2939

CVE.ORG link : CVE-2010-2939


JSON object : View

Products Affected

openssl

  • openssl
CWE
CWE-399

Resource Management Errors