The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 up to and including 0.9.8r and 1.0.x prior to 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote malicious users to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openssl openssl 0.9.8b |
||
openssl openssl 0.9.8m |
||
openssl openssl 0.9.8c |
||
openssl openssl 0.9.8n |
||
openssl openssl 0.9.8p |
||
openssl openssl 0.9.8e |
||
openssl openssl 0.9.8g |
||
openssl openssl 0.9.8k |
||
openssl openssl 0.9.8d |
||
openssl openssl 0.9.8j |
||
openssl openssl 0.9.8s |
||
openssl openssl 0.9.8l |
||
openssl openssl 0.9.8r |
||
openssl openssl 0.9.8a |
||
openssl openssl 0.9.8o |
||
openssl openssl 0.9.8q |
||
openssl openssl 0.9.8 |
||
openssl openssl 0.9.8i |
||
openssl openssl 0.9.8f |
||
openssl openssl 0.9.8h |
||
openssl openssl 1.0.0c |
||
openssl openssl 1.0.0 |
||
openssl openssl 1.0.0d |
||
openssl openssl 1.0.0a |
||
openssl openssl 1.0.0b |