SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   OpenSSL Vendors:   OpenSSL.org
OpenSSL S/MIME Parsing Null Pointer Dereference Lets Remote Users Deny Service
SecurityTracker Alert ID:  1026787
SecurityTracker URL:  http://securitytracker.com/id/1026787
CVE Reference:   CVE-2012-1165   (Links to External Site)
Date:  Mar 12 2012
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 0.9.8u, 1.0.0h
Description:   A vulnerability was reported in OpenSSL. A remote user can cause denial of service conditions.

A remote user can send specially crafted S/MIME headers to trigger a null pointer dereference in the ANS.1 parser and cause the target application using OpenSSL to crash.

The vulnerability resides in the mime_param_cmp() function.

bla reported this vulnerability.

Impact:   A remote user can cause the application using OpenSSL to crash.
Solution:   The vendor has issued a fix (0.9.8u, 1.0.0h).

The source code fix is available at:

http://cvs.openssl.org/chngview?cn=22252

Vendor URL:  www.openssl.org/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Mar 28 2012 (Red Hat Issues Fix) OpenSSL S/MIME Parsing Null Pointer Dereference Lets Remote Users Deny Service
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.
Feb 28 2013 (IBM Issues Fix for AIX) OpenSSL S/MIME Parsing Null Pointer Dereference Lets Remote Users Deny Service
IBM has issued a fix for AIX 5.3, 6.1, and 7.1.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC