First published: Thu Sep 28 2006(Updated: )
Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =0.9.7 | |
OpenSSL libcrypto | =0.9.7a | |
OpenSSL libcrypto | =0.9.7b | |
OpenSSL libcrypto | =0.9.7c | |
OpenSSL libcrypto | =0.9.7d | |
OpenSSL libcrypto | =0.9.7e | |
OpenSSL libcrypto | =0.9.7f | |
OpenSSL libcrypto | =0.9.7g | |
OpenSSL libcrypto | =0.9.7h | |
OpenSSL libcrypto | =0.9.7i | |
OpenSSL libcrypto | =0.9.7j | |
OpenSSL libcrypto | =0.9.7k | |
OpenSSL libcrypto | =0.9.8 | |
OpenSSL libcrypto | =0.9.8a | |
OpenSSL libcrypto | =0.9.8b | |
OpenSSL libcrypto | =0.9.8c |
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3738 is classified as a high severity vulnerability due to the potential for remote code execution based on a buffer overflow.
To fix CVE-2006-3738, upgrade OpenSSL to version 0.9.7l or later, or 0.9.8d or later.
CVE-2006-3738 affects OpenSSL versions earlier than 0.9.7l and 0.9.8d.
CVE-2006-3738 can lead to denial of service or remote execution of arbitrary code.
The recommended workaround for CVE-2006-3738 is to disable the use of shared ciphers if upgrading is not immediately feasible.