SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Blue Coat Reporter Vendors:   Blue Coat Systems
(Blue Coat Issues Fix for Reporter) OpenSSL Buffer Overflow in TLS Server Extension Parsing May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1026630
SecurityTracker URL:  http://securitytracker.com/id/1026630
CVE Reference:   CVE-2010-3864   (Links to External Site)
Date:  Feb 2 2012
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Reporter prior to 9.2.5.1 and 9.3.2.1
Description:   A vulnerability was reported in OpenSSL. A remote user can cause denial of service conditions. A remote user may be able to execute arbitrary code on the target system. Bluecoat Reporter is affected.

A remote user can send specially crafted data to exploit a TLS extension parsing race condition and trigger a buffer overflow, causing the target service to crash or potentially execute arbitrary code.

Multi-threaded TLS server applications that use OpenSSL's internal caching mechanism are affected.

The Apache HTTP server and Stunnel are not affected.

Rob Hulswit reported this vulnerability.

Impact:   A remote user may be able to execute arbitrary code on the target system.

A remote user can cause denial of service conditions.

Solution:   Bluecoat has issued a fix for Bluecoat Reporter (9.2.5.1, 9.3.2.1).

The Bluecoat advisory is available at:

https://kb.bluecoat.com/index?page=content&id=SA68

Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Nov 16 2010 OpenSSL Buffer Overflow in TLS Server Extension Parsing May Let Remote Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC