ID CVE-2010-3864
Summary Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
References
Vulnerable Configurations
  • OpenSSL Project OpenSSL 0.9.8f
    cpe:2.3:a:openssl:openssl:0.9.8f
  • OpenSSL Project OpenSSL 0.9.8g
    cpe:2.3:a:openssl:openssl:0.9.8g
  • OpenSSL Project OpenSSL 0.9.8h
    cpe:2.3:a:openssl:openssl:0.9.8h
  • OpenSSL Project OpenSSL 0.9.8i
    cpe:2.3:a:openssl:openssl:0.9.8i
  • OpenSSL Project OpenSSL 0.9.8j
    cpe:2.3:a:openssl:openssl:0.9.8j
  • OpenSSL Project OpenSSL 0.9.8k
    cpe:2.3:a:openssl:openssl:0.9.8k
  • OpenSSL Project OpenSSL 0.9.8l
    cpe:2.3:a:openssl:openssl:0.9.8l
  • OpenSSL Project OpenSSL 0.9.8m
    cpe:2.3:a:openssl:openssl:0.9.8m
  • OpenSSL Project OpenSSL 0.9.8n
    cpe:2.3:a:openssl:openssl:0.9.8n
  • OpenSSL Project OpenSSL 0.9.8o
    cpe:2.3:a:openssl:openssl:0.9.8o
  • OpenSSL Project OpenSSL 1.0.0
    cpe:2.3:a:openssl:openssl:1.0.0
  • OpenSSL Project OpenSSL 1.0.0a
    cpe:2.3:a:openssl:openssl:1.0.0a
CVSS
Base: 7.6 (as of 18-11-2010 - 09:16)
Impact:
Exploitability:
CWE CWE-362
CAPEC
  • Leveraging Race Conditions
    This attack targets a race condition occurring when multiple processes access and manipulate the same resource concurrently and the outcome of the execution depends on the particular order in which the access takes place. The attacker can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance a race condition can occur while accessing a file, the attacker can trick the system by replacing the original file with his version and cause the system to read the malicious file.
  • Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
    This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. The typical example is the file access. The attacker can leverage a file access race condition by "running the race", meaning that he would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the attacker could do something such as replace the file and cause an escalation of privilege.
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_10_6_8.NASL
    description The remote host is running a version of Mac OS X 10.6.x that is prior to 10.6.8. This update contains security-related fixes for the following components : - App Store - ATS - Certificate Trust Policy - CoreFoundation - CoreGraphics - FTP Server - ImageIO - International Components for Unicode - Kernel - Libsystem - libxslt - MobileMe - MySQL - OpenSSL - patch - QuickLook - QuickTime - Samba - servermgrd - subversion
    last seen 2019-02-21
    modified 2018-08-22
    plugin id 55416
    published 2011-06-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55416
    title Mac OS X 10.6.x < 10.6.8 Multiple Vulnerabilities
  • NASL family AIX Local Security Checks
    NASL id AIX_OPENSSL_ADVISORY2.NASL
    description The version of OpenSSL running on the remote host is affected by the following vulnerabilities : - ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka 'OCSP stapling vulnerability.' (CVE-2011-0014) - Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi- threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap- based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography. (CVE-2010-3864) - OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier. (CVE-2010-4180)
    last seen 2019-02-21
    modified 2018-07-17
    plugin id 73560
    published 2014-04-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=73560
    title AIX OpenSSL Advisory : openssl_advisory2.asc
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2010-326-01.NASL
    description New openssl packages are available for Slackware 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, and -current to fix security issues.
    last seen 2019-02-21
    modified 2018-06-27
    plugin id 50668
    published 2010-11-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50668
    title Slackware 11.0 / 12.0 / 12.1 / 12.2 / 13.0 / 13.1 / current : openssl (SSA:2010-326-01)
  • NASL family Misc.
    NASL id ADOBE_FMS_4_0_2.NASL
    description The version of Adobe Flash Media Server running on the remote host is earlier than version 3.5.6 or 4.0.2. Such versions are potentially affected by the following vulnerabilities : - The server is affected by a memory corruption issue due to a race condition in the TLS extension code provided by the bundled version of OpenSSL. A remote attacker may be able to exploit this vulnerability to execute arbitrary code on the server. (CVE-2010-3864) - The server is vulnerable to a denial of service attack due to an unspecified error related to processing certain XML content. (CVE-2011-0612)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 53895
    published 2011-05-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53895
    title Adobe Flash Media Server < 3.5.6 / 4.0.2 Multiple Vulnerabilities (APSB11-11)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2010-238.NASL
    description A vulnerability was discovered in openssl that causes a race condition within the TLS extension parsing code and which can be exploited to cause a heap-based buffer overflow (CVE-2010-3864). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=4 90 The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 50628
    published 2010-11-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50628
    title Mandriva Linux Security Advisory : openssl (MDVSA-2010:238)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201110-01.NASL
    description The remote host is affected by the vulnerability described in GLSA-201110-01 (OpenSSL: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers referenced below for details. Impact : A context-dependent attacker could cause a Denial of Service, possibly execute arbitrary code, bypass intended key requirements, force the downgrade to unintended ciphers, bypass the need for knowledge of shared secrets and successfully authenticate, bypass CRL validation, or obtain sensitive information in applications that use OpenSSL. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 56425
    published 2011-10-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56425
    title GLSA-201110-01 : OpenSSL: Multiple vulnerabilities
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-17827.NASL
    description This is a minor update from upstream fixing one race condition theoretically exploitable from remote connections in some SSL servers (CVE-2010-3864). There are also a few additional bug fixes. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 50664
    published 2010-11-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50664
    title Fedora 14 : openssl-1.0.0b-1.fc14 (2010-17827)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-17826.NASL
    description This is a minor update from upstream fixing one race condition theoretically exploitable from remote connections in some SSL servers (CVE-2010-3864). There are also a few additional bug fixes. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 50674
    published 2010-11-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50674
    title Fedora 12 : openssl-1.0.0b-1.fc12 (2010-17826)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_LIBOPENSSL-DEVEL-101111.NASL
    description The following issue has been fixed : - Multithreaded OpenSSL servers using the TLS server extension were vulnerable to a buffer overrun attack. CVE-2010-3864 has been assigned to this issue.
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 50939
    published 2010-12-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50939
    title SuSE 11 Security Update : libopenssl (SAT Patch Number 3509)
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2011-0003.NASL
    description a. vCenter Server and vCenter Update Manager update Microsoft SQL Server 2005 Express Edition to Service Pack 3 Microsoft SQL Server 2005 Express Edition (SQL Express) distributed with vCenter Server 4.1 Update 1 and vCenter Update Manager 4.1 Update 1 is upgraded from SQL Express Service Pack 2 to SQL Express Service Pack 3, to address multiple security issues that exist in the earlier releases of Microsoft SQL Express. Customers using other database solutions need not update for these issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2008-5416, CVE-2008-0085, CVE-2008-0086, CVE-2008-0107 and CVE-2008-0106 to the issues addressed in MS SQL Express Service Pack 3. b. vCenter Apache Tomcat Management Application Credential Disclosure The Apache Tomcat Manager application configuration file contains logon credentials that can be read by unprivileged local users. The issue is resolved by removing the Manager application in vCenter 4.1 Update 1. If vCenter 4.1 is updated to vCenter 4.1 Update 1 the logon credentials are not present in the configuration file after the update. VMware would like to thank Claudio Criscione of Secure Networking for reporting this issue to us. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2010-2928 to this issue. c. vCenter Server and ESX, Oracle (Sun) JRE is updated to version 1.6.0_21 Oracle (Sun) JRE update to version 1.6.0_21, which addresses multiple security issues that existed in earlier releases of Oracle (Sun) JRE. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names to the security issues fixed in Oracle (Sun) JRE 1.6.0_19: CVE-2009-3555, CVE-2010-0082, CVE-2010-0084, CVE-2010-0085, CVE-2010-0087, CVE-2010-0088, CVE-2010-0089, CVE-2010-0090, CVE-2010-0091, CVE-2010-0092, CVE-2010-0093, CVE-2010-0094, CVE-2010-0095, CVE-2010-0837, CVE-2010-0838, CVE-2010-0839, CVE-2010-0840, CVE-2010-0841, CVE-2010-0842, CVE-2010-0843, CVE-2010-0844, CVE-2010-0845, CVE-2010-0846, CVE-2010-0847, CVE-2010-0848, CVE-2010-0849, CVE-2010-0850. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following name to the security issue fixed in Oracle (Sun) JRE 1.6.0_20: CVE-2010-0886. d. vCenter Update Manager Oracle (Sun) JRE is updated to version 1.5.0_26 Oracle (Sun) JRE update to version 1.5.0_26, which addresses multiple security issues that existed in earlier releases of Oracle (Sun) JRE. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names to the security issues fixed in Oracle (Sun) JRE 1.5.0_26: CVE-2010-3556, CVE-2010-3566, CVE-2010-3567, CVE-2010-3550, CVE-2010-3561, CVE-2010-3573, CVE-2010-3565,CVE-2010-3568, CVE-2010-3569, CVE-2009-3555, CVE-2010-1321, CVE-2010-3548, CVE-2010-3551, CVE-2010-3562, CVE-2010-3571, CVE-2010-3554, CVE-2010-3559, CVE-2010-3572, CVE-2010-3553, CVE-2010-3549, CVE-2010-3557, CVE-2010-3541, CVE-2010-3574. e. vCenter Server and ESX Apache Tomcat updated to version 6.0.28 Apache Tomcat updated to version 6.0.28, which addresses multiple security issues that existed in earlier releases of Apache Tomcat The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names to the security issues fixed in Apache Tomcat 6.0.24: CVE-2009-2693, CVE-2009-2901, CVE-2009-2902,i and CVE-2009-3548. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names to the security issues fixed in Apache Tomcat 6.0.28: CVE-2010-2227, CVE-2010-1157. f. vCenter Server third-party component OpenSSL updated to version 0.9.8n The version of the OpenSSL library in vCenter Server is updated to 0.9.8n. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-0740 and CVE-2010-0433 to the issues addressed in this version of OpenSSL. g. ESX third-party component OpenSSL updated to version 0.9.8p The version of the ESX OpenSSL library is updated to 0.9.8p. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-3864 and CVE-2010-2939 to the issues addressed in this update. h. ESXi third-party component cURL updated The version of cURL library in ESXi is updated. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-0734 to the issues addressed in this update. i. ESX third-party component pam_krb5 updated The version of pam_krb5 library is updated. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2008-3825 and CVE-2009-1384 to the issues addressed in the update. j. ESX third-party update for Service Console kernel The Service Console kernel is updated to include kernel version 2.6.18-194.11.1. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-1084, CVE-2010-2066, CVE-2010-2070, CVE-2010-2226, CVE-2010-2248, CVE-2010-2521, CVE-2010-2524, CVE-2010-0008, CVE-2010-0415, CVE-2010-0437, CVE-2009-4308, CVE-2010-0003, CVE-2010-0007, CVE-2010-0307, CVE-2010-1086, CVE-2010-0410, CVE-2010-0730, CVE-2010-1085, CVE-2010-0291, CVE-2010-0622, CVE-2010-1087, CVE-2010-1173, CVE-2010-1437, CVE-2010-1088, CVE-2010-1187, CVE-2010-1436, CVE-2010-1641, and CVE-2010-3081 to the issues addressed in the update. Notes : - The update also addresses the 64-bit compatibility mode stack pointer underflow issue identified by CVE-2010-3081. This issue was patched in an ESX 4.1 patch prior to the release of ESX 4.1 Update 1 and in a previous ESX 4.0 patch release. - The update also addresses CVE-2010-2240 for ESX 4.0.
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 51971
    published 2011-02-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=51971
    title VMSA-2011-0003 : Third-party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_3042C33AF23711DF9D020018FE623F2B.NASL
    description OpenSSL Team reports : Rob Hulswit has found a flaw in the OpenSSL TLS server extension code parsing which on affected servers can be exploited in a buffer overrun attack. Any OpenSSL based TLS server is vulnerable if it is multi-threaded and uses OpenSSL's internal caching mechanism. Servers that are multi-process and/or disable internal session caching are NOT affected. In particular the Apache HTTP server (which never uses OpenSSL internal caching) and Stunnel (which includes its own workaround) are NOT affected.
    last seen 2019-02-21
    modified 2018-12-19
    plugin id 50627
    published 2010-11-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50627
    title FreeBSD : openssl -- TLS extension parsing race condition (3042c33a-f237-11df-9d02-0018fe623f2b)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_1_LIBOPENSSL-DEVEL-101111.NASL
    description Multithreaded OpenSSL servers using the TLS server extension are vulnerable to a buffer overrun attack. CVE-2010-3864 has been assigned to this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 53675
    published 2011-05-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53675
    title openSUSE Security Update : libopenssl-devel (openSUSE-SU-2010:0965-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_2_LIBOPENSSL-DEVEL-101119.NASL
    description Multithreaded OpenSSL servers using the TLS server extension are vulnerable to a buffer overrun attack (CVE-2010-3864).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 53750
    published 2011-05-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53750
    title openSUSE Security Update : libopenssl-devel (openSUSE-SU-2010:0965-2)
  • NASL family Web Servers
    NASL id OPENSSL_0_9_8P_1_0_0B.NASL
    description According to its banner, the remote server is running a version of OpenSSL that is earlier than 0.9.8p / 1.0.0b. If a TLS server is multithreaded and uses the SSL cache, a remote attacker could trigger a buffer overflow and crash the server or run arbitrary code.
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 17766
    published 2012-01-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17766
    title OpenSSL < 0.9.8p / 1.0.0b Buffer Overflow
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_LIBOPENSSL-DEVEL-101119.NASL
    description Multithreaded OpenSSL servers using the TLS server extension are vulnerable to a buffer overrun attack (CVE-2010-3864).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75593
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75593
    title openSUSE Security Update : libopenssl-devel (openSUSE-SU-2010:0965-2)
  • NASL family Misc.
    NASL id VMWARE_VMSA-2011-0003_REMOTE.NASL
    description The remote VMware ESX / ESXi host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in several third-party components and libraries : - Apache Tomcat - Apache Tomcat Manager - cURL - Java Runtime Environment (JRE) - Kernel - Microsoft SQL Express - OpenSSL - pam_krb5
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 89674
    published 2016-03-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89674
    title VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2011-0003) (remote check)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20101116_OPENSSL_ON_SL6_X.NASL
    description A race condition flaw has been found in the OpenSSL TLS server extension parsing code, which could affect some multithreaded OpenSSL applications. Under certain specific conditions, it may be possible for a remote attacker to trigger this race condition and cause such an application to crash, or possibly execute arbitrary code with the permissions of the application. (CVE-2010-3864) Note that this issue does not affect the Apache HTTP Server. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 60899
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60899
    title Scientific Linux Security Update : openssl on SL6.x i386/x86_64
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-17847.NASL
    description This is a minor update from upstream fixing one race condition theoretically exploitable from remote connections in some SSL servers (CVE-2010-3864). There are also a few additional bug fixes. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 50675
    published 2010-11-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50675
    title Fedora 13 : openssl-1.0.0b-1.fc13 (2010-17847)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2125.NASL
    description A flaw has been found in the OpenSSL TLS server extension code parsing which on affected servers can be exploited in a buffer overrun attack. This allows an attacker to cause an application crash or potentially to execute arbitrary code. However, not all OpenSSL based SSL/TLS servers are vulnerable: a server is vulnerable if it is multi-threaded and uses OpenSSL's internal caching mechanism. In particular the Apache HTTP server (which never uses OpenSSL internal caching) and Stunnel (which includes its own workaround) are NOT affected.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 50696
    published 2010-11-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50696
    title Debian DSA-2125-1 : openssl - buffer overflow
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2010-0888.NASL
    description Updated openssl packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. A race condition flaw has been found in the OpenSSL TLS server extension parsing code, which could affect some multithreaded OpenSSL applications. Under certain specific conditions, it may be possible for a remote attacker to trigger this race condition and cause such an application to crash, or possibly execute arbitrary code with the permissions of the application. (CVE-2010-3864) Note that this issue does not affect the Apache HTTP Server. Refer to Red Hat Bugzilla bug 649304 for more technical details on how to determine if your application is affected. Red Hat would like to thank Rob Hulswit for reporting this issue. All OpenSSL users should upgrade to these updated packages, which contain a backported patch to resolve this issue. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 50642
    published 2010-11-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50642
    title RHEL 6 : openssl (RHSA-2010:0888)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_LIBOPENSSL-DEVEL-101116.NASL
    description The following issue has been fixed : - Multithreaded OpenSSL servers using the TLS server extension were vulnerable to a buffer overrun attack. CVE-2010-3864 has been assigned to this issue.
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 51619
    published 2011-01-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=51619
    title SuSE 11.1 Security Update : libopenssl (SAT Patch Number 3539)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1018-1.NASL
    description Rob Hulswit discovered a race condition in the OpenSSL TLS server extension parsing code when used within a threaded server. A remote attacker could trigger this flaw to cause a denial of service or possibly execute arbitrary code with application privileges. (CVE-2010-3864). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 50649
    published 2010-11-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50649
    title Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : openssl vulnerability (USN-1018-1)
redhat via4
advisories
bugzilla
id 649304
title CVE-2010-3864 OpenSSL TLS extension parsing race condition
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 6 Client is installed
      oval oval:com.redhat.rhsa:tst:20100842001
    • comment Red Hat Enterprise Linux 6 Server is installed
      oval oval:com.redhat.rhsa:tst:20100842002
    • comment Red Hat Enterprise Linux 6 Workstation is installed
      oval oval:com.redhat.rhsa:tst:20100842003
    • comment Red Hat Enterprise Linux 6 ComputeNode is installed
      oval oval:com.redhat.rhsa:tst:20100842004
  • OR
    • AND
      • comment openssl is earlier than 0:1.0.0-4.el6_0.1
        oval oval:com.redhat.rhsa:tst:20100888005
      • comment openssl is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100888006
    • AND
      • comment openssl-devel is earlier than 0:1.0.0-4.el6_0.1
        oval oval:com.redhat.rhsa:tst:20100888011
      • comment openssl-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100888012
    • AND
      • comment openssl-perl is earlier than 0:1.0.0-4.el6_0.1
        oval oval:com.redhat.rhsa:tst:20100888007
      • comment openssl-perl is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100888008
    • AND
      • comment openssl-static is earlier than 0:1.0.0-4.el6_0.1
        oval oval:com.redhat.rhsa:tst:20100888009
      • comment openssl-static is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100888010
rhsa
id RHSA-2010:0888
released 2010-11-16
severity Important
title RHSA-2010:0888: openssl security update (Important)
rpms
  • openssl-0:1.0.0-4.el6_0.1
  • openssl-devel-0:1.0.0-4.el6_0.1
  • openssl-perl-0:1.0.0-4.el6_0.1
  • openssl-static-0:1.0.0-4.el6_0.1
refmap via4
apple APPLE-SA-2011-06-23-1
bugtraq 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
cert-vn VU#737740
confirm
debian DSA-2125
fedora
  • FEDORA-2010-17826
  • FEDORA-2010-17827
  • FEDORA-2010-17847
freebsd FreeBSD-SA-10:10
hp
  • HPSBGN02740
  • HPSBMA02658
  • HPSBOV02670
  • HPSBUX02638
  • SSRT100339
  • SSRT100413
  • SSRT100475
  • SSRT100741
mlist
  • [syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released
  • [syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released
sectrack 1024743
secunia
  • 42241
  • 42243
  • 42309
  • 42336
  • 42352
  • 42397
  • 42413
  • 43312
  • 44269
  • 57353
slackware SSA:2010-326-01
suse SUSE-SR:2010:022
vupen
  • ADV-2010-3041
  • ADV-2010-3077
  • ADV-2010-3097
  • ADV-2010-3121
Last major update 22-08-2016 - 22:02
Published 17-11-2010 - 11:00
Last modified 10-10-2018 - 16:05
Back to Top