OpenSSL contains a null-pointer assignment in the do_change_cipher_spec() function which could allow a remote, unauthenticated attacker to cause OpenSSL to crash.
OpenSSL implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols and includes a general purpose cryptographic library. SSL and TLS are commonly used to provide authentication, encryption, integrity, and non-repudiation services to network applications such as HTTP, IMAP, POP3, LDAP, and others.
Versions of OpenSSL from 0.9.6c to 0.9.6k inclusive and 0.9.7a to 0.9.7c inclusive contain a null-pointer assignment in the do_change_cipher_spec() function. By sending a specially crafted SSL/TLS handshake to an application that uses a vulnerable OpenSSL library, a remote, unauthenticated attacker could cause OpenSSL to crash.
A remote, unauthenticated attacker could cause a denial of service in an application that uses OpenSSL.
Upgrade or Patch
Apple Computer Inc.
Red Hat Inc.
Cisco Systems Inc.
Foundry Networks Inc.
Global Technology Associates
Internet Initiative Japan (IIJ)
Multi-Tech Systems Inc.
Redback Networks Inc.
SSH Communications Security
Secure Computing Corporation
Sun Microsystems Inc.
Wind River Systems Inc.
This vulnerability was discovered by the OpenSSL Project and reported by the National Infrastructure Security Co-ordination Centre (NISCC).
This document was written by Damon Morda.
|Date First Published:||2004-03-17|
|Date Last Updated:||2004-03-26 21:58 UTC|