5
CVSSv2

CVE-2009-1386

Published: 04/06/2009 Updated: 07/02/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

ssl/s3_pkt.c in OpenSSL prior to 0.9.8i allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl

redhat openssl 0.9.6-15

redhat openssl 0.9.6b-3

redhat openssl 0.9.7a-2

canonical ubuntu linux 9.04

canonical ubuntu linux 8.10

canonical ubuntu linux 8.04

canonical ubuntu linux 6.06

Vendor Advisories

Debian Bug report logs - #532037 CVE-2009-138{6,7}: Two OpenSSL DTLS remote DoS Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Giuseppe Iuculano <giuseppe@iuculanoit> Date: Fri, 5 Jun 2 ...
It was discovered that OpenSSL did not limit the number of DTLS records it would buffer when they arrived with a future epoch A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests (CVE-2009-1377) ...

Exploits

/* * cve-2009-1386c * * OpenSSL < 098i DTLS ChangeCipherSpec Remote DoS * Jon Oberheide <jon@oberheideorg> * jonoberheideorg * * Information: * * cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2009-1386 * * OpenSSL would SegFault if the DTLS server receives a ChangeCipherSpec as * the first record instead ...
OpenSSL versions below 098i DTLS ChangeCipherSpec remote denial of service exploit ...