Vulnerability Note VU#661475
OpenSSL Server Name extension Denial of Service
A vulnerability exists in OpenSSL that may allow a remote attacker to cause a denial of service.
OpenSSL contains a vulnerability in the way server name extension data is handled that may result in a denial of service. According to OpenSSL Security Advisory [28-Mar-2008]:
If OpenSSL has been compiled using the non-default TLS server name extensions, a remote attacker could send a carefully crafted packet to a server application using OpenSSL and cause it to crash.
Note that this issue may affect OpenSSL versions prior to 0.9.8h.
A remote, unauthorized attacker may be able to cause a denial of service.
Upgrade or Apply Patch
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|OpenSSL||Affected||-||30 May 2008|
CVSS Metrics (Learn More)
This issue was reported in OpenSSL Security Advisory [28-Mar-2008]. OpenSSL credits Codenomicon for reporting these issues.
This document was written by Chris Taschner.
- CVE IDs: CVE-2008-0891
- Date Public: 28 May 2008
- Date First Published: 30 May 2008
- Date Last Updated: 30 May 2008
- Severity Metric: 14.88
- Document Revision: 7
If you have feedback, comments, or additional information about this vulnerability, please send us email.