First published: Wed Oct 08 2003(Updated: )
OpenSSL 0.9.6e uses assertions when detecting buffer overflow attacks instead of less severe mechanisms, which allows remote attackers to cause a denial of service (crash) via certain messages that cause OpenSSL to abort from a failed assertion, as demonstrated using SSLv2 CLIENT_MASTER_KEY messages, which are not properly handled in s2_srvr.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL | =0.9.6e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1568 is considered a denial of service vulnerability.
To fix CVE-2002-1568, upgrade to a later version of OpenSSL that does not use assertions to handle buffer overflow attacks.
CVE-2002-1568 specifically affects OpenSSL version 0.9.6e.
CVE-2002-1568 can be exploited through crafted SSLv2 CLIENT_MASTER_KEY messages to cause a denial of service.
CVE-2002-1568 does not allow remote attackers to gain access but can crash the OpenSSL service.