Vulnerability Note VU#288574
OpenSSL contains null-pointer assignment in do_change_cipher_spec() function
OpenSSL contains a null-pointer assignment in the do_change_cipher_spec() function which could allow a remote, unauthenticated attacker to cause OpenSSL to crash.
OpenSSL implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols and includes a general purpose cryptographic library. SSL and TLS are commonly used to provide authentication, encryption, integrity, and non-repudiation services to network applications such as HTTP, IMAP, POP3, LDAP, and others.
Versions of OpenSSL from 0.9.6c to 0.9.6k inclusive and 0.9.7a to 0.9.7c inclusive contain a null-pointer assignment in the do_change_cipher_spec() function. By sending a specially crafted SSL/TLS handshake to an application that uses a vulnerable OpenSSL library, a remote, unauthenticated attacker could cause OpenSSL to crash.
A remote, unauthenticated attacker could cause a denial of service in an application that uses OpenSSL.
Upgrade or Patch
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apple Computer Inc.||Affected||17 Mar 2004||06 May 2005|
|Check Point||Affected||17 Mar 2004||25 Mar 2004|
|Debian||Affected||17 Mar 2004||26 Mar 2004|
|OpenSSL||Affected||-||16 Mar 2004|
|Red Hat Inc.||Affected||17 Mar 2004||25 Mar 2004|
|SuSE Inc.||Affected||17 Mar 2004||25 Mar 2004|
|Extreme Networks||Not Affected||17 Mar 2004||26 Mar 2004|
|3Com||Unknown||-||18 Mar 2004|
|Alcatel||Unknown||-||18 Mar 2004|
|Apache||Unknown||-||18 Mar 2004|
|Apache-SSL||Unknown||-||18 Mar 2004|
|At&T||Unknown||-||18 Mar 2004|
|Avaya||Unknown||-||18 Mar 2004|
|Borderware||Unknown||-||18 Mar 2004|
|BSDI||Unknown||-||18 Mar 2004|
CVSS Metrics (Learn More)
This vulnerability was discovered by the OpenSSL Project and reported by the National Infrastructure Security Co-ordination Centre (NISCC).
This document was written by Damon Morda.
- CVE IDs: CAN-2004-0079
- Date Public: 17 Mar 2004
- Date First Published: 17 Mar 2004
- Date Last Updated: 26 Mar 2004
- Severity Metric: 27.38
- Document Revision: 19
If you have feedback, comments, or additional information about this vulnerability, please send us email.