First published: Fri Mar 05 2010(Updated: )
OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =0.9.8b | |
OpenSSL libcrypto | <=0.9.8l | |
OpenSSL libcrypto | =0.9.8c | |
OpenSSL libcrypto | =0.9.8e | |
OpenSSL libcrypto | =0.9.8g | |
OpenSSL libcrypto | =0.9.8k | |
OpenSSL libcrypto | =0.9.8d | |
OpenSSL libcrypto | =0.9.8j | |
OpenSSL libcrypto | =0.9.8a | |
OpenSSL libcrypto | =0.9.8 | |
OpenSSL libcrypto | =0.9.8i | |
OpenSSL libcrypto | =0.9.8f | |
OpenSSL libcrypto | =0.9.8h |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-3245 is not explicitly rated but involves potential unspecified impacts due to null return value checks.
To fix CVE-2009-3245, upgrade your OpenSSL version to 0.9.8m or later.
CVE-2009-3245 affects OpenSSL versions prior to 0.9.8m, including 0.9.8a through 0.9.8l.
CVE-2009-3245 has context-dependent attack vectors which may exploit functions without proper null checks.
CVE-2009-3245 remains a concern for systems running older versions of OpenSSL, especially those still in use.