Vulnerability Note VU#520586
OpenSSL TLS handshake Denial of Service
A vulnerability exists in OpenSSL that may allow a remote attacker to cause a denial of service.
OpenSSL contains a vulnerability in the way specially crafted TLS handshake packets are handled that may result in a denial of service. According to OpenSSL Security Advisory [28-Mar-2008]:
... if the 'Server Key exchange message' is omitted from a TLS handshake in OpenSSL 0.9.8f and OpenSSL 0.9.8g. If a client connects to a malicious server with particular cipher suites, the server could cause the client to crash.
A remote, unauthorized attacker may be able to cause a denial of service.
Upgrade or Apply Patch
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|OpenSSL||Affected||-||30 May 2008|
CVSS Metrics (Learn More)
This issue was reported in OpenSSL Security Advisory [28-Mar-2008]. OpenSSL credits Codenomicon for reporting these issues.
This document was written by Chris Taschner.
- CVE IDs: CVE-2008-1672
- Date Public: 28 May 2008
- Date First Published: 30 May 2008
- Date Last Updated: 30 May 2008
- Severity Metric: 14.70
- Document Revision: 8
If you have feedback, comments, or additional information about this vulnerability, please send us email.