4.3
CVSSv2

CVE-2010-2939

Published: 17/08/2010 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime. NOTE: some sources refer to this as a use-after-free issue.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.7

openssl openssl 0.9.8

openssl openssl 1.0.0a

Vendor Advisories

Debian Bug report logs - #594415 CVE-2010-2939: Double free Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 25 Aug 2010 20:06:01 UTC Severit ...
It was discovered that OpenSSL incorrectly handled return codes from the bn_wexpand function calls A remote attacker could trigger this flaw in services that used SSL to cause a denial of service or possibly execute arbitrary code with application privileges This issue only affected Ubuntu 606 LTS, 804 LTS, 904 and 910 (CVE-2009-3245) ...

Exploits

source: wwwsecurityfocuscom/bid/42306/info OpenSSL is prone to a remote memory-corruption vulnerability Successfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the application using the vulnerable library Failed exploit attempts will result in a denial-of-service condition The issue affect ...