Giuseppe Iuculano
2009-Jun-05 22:10 UTC
[Secure-testing-team] Bug#532037: CVE-2009-138{6, 7}: Two OpenSSL DTLS remote DoS
Package: openssl Severity: serious Tags: security -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for openssl. CVE-2009-1386[0]: | ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause | a denial of service (NULL pointer dereference and daemon crash) via a | DTLS ChangeCipherSpec packet that occurs before ClientHello. CVE-2009-1387[1]: | The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in | OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial | of service (NULL pointer dereference and daemon crash) via an | out-of-sequence DTLS handshake message, related to a "fragment bug." If you fix the vulnerabilities please also make sure to include the CVE ids in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386 http://security-tracker.debian.net/tracker/CVE-2009-1386 http://rt.openssl.org/Ticket/Display.html?id=1679&user=guest&pass=guest http://cvs.openssl.org/chngview?cn=17369 [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387 http://security-tracker.debian.net/tracker/CVE-2009-1387 http://rt.openssl.org/Ticket/Display.html?id=1838&user=guest&pass=guest http://cvs.openssl.org/chngview?cn=17958 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkopl+kACgkQNxpp46476apHCwCgkOZVb6btWoJtE+xgbtiKfefF U2kAn3B3ScTrmgrx8Px6WAJAx2AQ0aep =vFTu -----END PGP SIGNATURE-----