First published: Thu May 29 2008(Updated: )
Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =0.9.8g | |
OpenSSL libcrypto | =0.9.8f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0891 is rated as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2008-0891, upgrade OpenSSL to version 0.9.8h or later where the vulnerability is patched.
CVE-2008-0891 affects OpenSSL versions 0.9.8f and 0.9.8g when TLS server name extensions are enabled.
CVE-2008-0891 enables remote attackers to crash the server by sending a malformed Client Hello packet.
Yes, CVE-2008-0891 is a known vulnerability that has been documented and reported by several security advisories.