SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   OpenSSL Vendors:   OpenSSL.org
(NetBSD Issues Fix) OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny Service
SecurityTracker Alert ID:  1027136
SecurityTracker URL:  http://securitytracker.com/id/1027136
CVE Reference:   CVE-2012-2333   (Links to External Site)
Date:  Jun 8 2012
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to versions 0.9.8x, 1.0.0j, 1.0.1c
Description:   A vulnerability was reported in OpenSSL. A remote user can cause denial of service conditions.

A remote user can send specially crafted TLS/DTLS records to cause denial of service conditions.

The CBC mode ciphersuites in TLS 1.1, 1.2 and DTLS are affected

Both clients and servers are affected.

DTLS is affected in all versions of OpenSSL.

TLS is affected in OpenSSL version 1.0.1 and later.

Codenomicon reported this vulnerability.

Impact:   A remote user can cause denial of service conditions.
Solution:   NetBSD has issued a fix.

The NetBSD advisory is available at:

http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2012-002.txt.asc

Vendor URL:  www.openssl.org/news/secadv_20120510.txt (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  UNIX (NetBSD)
Underlying OS Comments:  4.0, 5.0, 5.1

Message History:   This archive entry is a follow-up to the message listed below.
May 11 2012 OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC