First published: Thu May 29 2008(Updated: )
OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =0.9.8f | |
OpenSSL libcrypto | =0.9.8g | |
Ubuntu Linux | =8.04 | |
Ubuntu | =8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1672 is classified as a critical vulnerability due to its potential to cause a remote denial of service.
To fix CVE-2008-1672, you should upgrade OpenSSL to a version later than 0.9.8g.
CVE-2008-1672 affects OpenSSL versions 0.9.8f and 0.9.8g, as well as systems using these versions.
CVE-2008-1672 can be exploited by attackers through a crafted TLS handshake that omits the Server Key Exchange message.
The impact of CVE-2008-1672 is the potential crash of the OpenSSL service, leading to a denial of service.