4.3
CVSSv2

CVE-2008-1672

Published: 29/05/2008 Updated: 02/02/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

OpenSSL 0.9.8f and 0.9.8g allows remote malicious users to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.8f

openssl openssl 0.9.8g

canonical ubuntu linux 8.04

Vendor Advisories

Debian Bug report logs - #483379 openssl: CVE-2008-1672, CVE-2008-0891 multiple security issues Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Wed, 28 M ...
It was discovered that OpenSSL was vulnerable to a double-free when using TLS server extensions A remote attacker could send a crafted packet and cause a denial of service via application crash in applications linked against OpenSSL Ubuntu 804 LTS does not compile TLS server extensions by default (CVE-2008-0891) ...