First published: Wed Apr 30 2008(Updated: )
Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <0:2.2.3-22.el5_3.1 | 0:2.2.3-22.el5_3.1 |
OpenSSL libcrypto | =0.9.8f | |
OpenSSL libcrypto | =0.9.8g | |
OpenSSL libcrypto | =0.9.8h |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1678 has a severity rating that indicates it can lead to denial of service through memory consumption.
To fix CVE-2008-1678, upgrade to OpenSSL version 0.9.8i or later.
CVE-2008-1678 affects OpenSSL versions 0.9.8f through 0.9.8h and specific versions of Apache HTTP Server mod_ssl.
Yes, CVE-2008-1678 can be exploited remotely through multiple SSL client handshake requests.
Yes, a patch is available in later versions of OpenSSL to address the vulnerability in CVE-2008-1678.