OpenSSL TLS Server Extension Parsing Buffer Overflow Vulnerability

OpenSSL is prone to a heap-based buffer-overflow vulnerability because the library fails to properly perform bounds-checks on user-supplied input before copying it to an insufficiently sized memory buffer.

Successfully exploiting this issue may allow attackers to execute arbitrary code in the context of applications that use the affected library, but this has not been confirmed. Failed exploit attempts may crash applications, denying service to legitimate users.

OpenSSL 0.9.8f to 0.9.8o, 1.0.0, and 1.0.0a are vulnerable.

NOTE: This issue affects servers which are multi-threaded and use OpenSSL's internal caching mechanism. Multi-processed servers or servers with disabled internal caching (like Apache HTTP server and Stunnel) are not affected.


 

Privacy Statement
Copyright 2010, SecurityFocus