CVE-2009-1386
OpenSSL DTLS ChangeCipherSpec Remote DoS
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
ssl/s3_pkt.c en OpenSSL anteriores a v0.9.8i permite a los atacantes remotos, causar una denegación de servicios (puntero NULO desreferenciado y caída del "daemon"), a través de un paquete ChangeCipherSpec DTLs que ocurre antes de ClientHello.
It was discovered that OpenSSL did not limit the number of DTLS records it would buffer when they arrived with a future epoch. A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests. It was discovered that OpenSSL did not properly free memory when processing DTLS fragments. A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests. It was discovered that OpenSSL did not properly handle certain server certificates when processing DTLS packets. A remote DTLS server could cause a denial of service by sending a message containing a specially crafted server certificate. It was discovered that OpenSSL did not properly handle a DTLS ChangeCipherSpec packet when it occurred before ClientHello. A remote attacker could cause a denial of service by sending a specially crafted request. It was discovered that OpenSSL did not properly handle out of sequence DTLS handshake messages. A remote attacker could cause a denial of service by sending a specially crafted request.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-04-23 CVE Reserved
- 2009-06-04 CVE Published
- 2009-06-04 First Exploit
- 2024-08-07 CVE Updated
- 2025-07-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (24)
URL | Tag | Source |
---|---|---|
http://lists.vmware.com/pipermail/security-announce/2010/000082.html | Mailing List | |
http://secunia.com/advisories/35571 | Not Applicable | |
http://secunia.com/advisories/35685 | Not Applicable | |
http://secunia.com/advisories/35729 | Not Applicable | |
http://secunia.com/advisories/36533 | Not Applicable | |
http://secunia.com/advisories/38794 | Not Applicable | |
http://secunia.com/advisories/38834 | Third Party Advisory | |
http://www.openwall.com/lists/oss-security/2009/06/02/1 | Mailing List |
|
https://exchange.xforce.ibmcloud.com/vulnerabilities/50963 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11179 | Broken Link | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7469 | Broken Link |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/180494 | 2024-08-31 | |
https://packetstorm.news/files/id/78064 | 2009-06-04 | |
https://www.exploit-db.com/exploits/8873 | 2024-08-07 | |
http://www.securityfocus.com/bid/35174 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://cvs.openssl.org/chngview?cn=17369 | 2024-02-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openssl Search vendor "Openssl" | Openssl Search vendor "Openssl" for product "Openssl" | > 0.9.8 < 0.9.8i Search vendor "Openssl" for product "Openssl" and version " > 0.9.8 < 0.9.8i" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openssl Search vendor "Redhat" for product "Openssl" | 0.9.6-15 Search vendor "Redhat" for product "Openssl" and version "0.9.6-15" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openssl Search vendor "Redhat" for product "Openssl" | 0.9.6b-3 Search vendor "Redhat" for product "Openssl" and version "0.9.6b-3" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openssl Search vendor "Redhat" for product "Openssl" | 0.9.7a-2 Search vendor "Redhat" for product "Openssl" and version "0.9.7a-2" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 6.06 Search vendor "Canonical" for product "Ubuntu Linux" and version "6.06" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 8.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "8.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 8.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "8.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 9.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "9.04" | - |
Affected
|