4.3
CVSSv2

CVE-2008-0891

Published: 29/05/2008 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote malicious users to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.8g

openssl openssl 0.9.8f

Vendor Advisories

It was discovered that OpenSSL was vulnerable to a double-free when using TLS server extensions A remote attacker could send a crafted packet and cause a denial of service via application crash in applications linked against OpenSSL Ubuntu 804 LTS does not compile TLS server extensions by default (CVE-2008-0891) ...
Debian Bug report logs - #483379 openssl: CVE-2008-1672, CVE-2008-0891 multiple security issues Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Wed, 28 M ...