ID |
CVE-2008-1678
|
Summary |
Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
|
CVSS |
Base: | 5.0 (as of 13-02-2023 - 02:18) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-399 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
oval
via4
|
accepted | 2013-04-29T04:21:53.124-04:00 | class | vulnerability | contributors | name | Aharon Chernin | organization | SCAP.com, LLC |
name | Dragos Prisaca | organization | G2, Inc. |
| definition_extensions | comment | The operating system installed on the system is Red Hat Enterprise Linux 5 | oval | oval:org.mitre.oval:def:11414 |
comment | The operating system installed on the system is CentOS Linux 5.x | oval | oval:org.mitre.oval:def:15802 |
comment | Oracle Linux 5.x | oval | oval:org.mitre.oval:def:15459 |
| description | Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm. | family | unix | id | oval:org.mitre.oval:def:9754 | status | accepted | submitted | 2010-07-09T03:56:16-04:00 | title | Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm. | version | 18 |
|
redhat
via4
|
advisories | | rpms | - httpd-0:2.2.3-22.el5_3.1
- httpd-debuginfo-0:2.2.3-22.el5_3.1
- httpd-devel-0:2.2.3-22.el5_3.1
- httpd-manual-0:2.2.3-22.el5_3.1
- mod_ssl-1:2.2.3-22.el5_3.1
|
|
refmap
via4
|
apple | APPLE-SA-2008-10-09 | bid | | confirm | | fedora | FEDORA-2008-6393 | gentoo | GLSA-200807-06 | mandriva | MDVSA-2009:124 | mlist | [openssl-dev] 20080512 possible memory leak in zlib compression | secunia | - 31026
- 31416
- 32222
- 34219
- 35264
- 38761
- 42724
- 42733
- 44183
| slackware | SSA:2010-060-02 | sreason | 3981 | suse | SUSE-SR:2008:024 | ubuntu | USN-731-1 | vupen | ADV-2008-2780 | xf | openssl-libssl-dos(43948) |
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2009-05-28 | organization | Red Hat | statement | Not vulnerable. This issue did not affect the versions of mod_ssl or httpd as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5 prior to 5.3.
In Red Hat Enterprise Linux 5.3, OpenSSL packages were rebased to upstream version 0.9.8e via RHBA-2009:0181 (https://rhn.redhat.com/errata/RHBA-2009-0181.html), introducing this problem in Red Hat Enterprise Linux 5. Updated httpd packages were released via: https://rhn.redhat.com/errata/RHSA-2009-1075.html
|
|
Last major update |
13-02-2023 - 02:18 |
Published |
10-07-2008 - 17:41 |
Last modified |
13-02-2023 - 02:18 |