4.3
CVSSv2

CVE-2008-0891

Published: 29/05/2008 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote malicious users to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.8g

openssl openssl 0.9.8f

Vendor Advisories

Debian Bug report logs - #483379 openssl: CVE-2008-1672, CVE-2008-0891 multiple security issues Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Wed, 28 M ...
It was discovered that OpenSSL was vulnerable to a double-free when using TLS server extensions A remote attacker could send a crafted packet and cause a denial of service via application crash in applications linked against OpenSSL Ubuntu 804 LTS does not compile TLS server extensions by default (CVE-2008-0891) ...