First published: Fri Mar 26 2010(Updated: )
The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number. NOTE: some of these details are obtained from third party information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL | =0.9.8f | |
OpenSSL | =0.9.8g | |
OpenSSL | =0.9.8h | |
OpenSSL | =0.9.8i | |
OpenSSL | =0.9.8j | |
OpenSSL | =0.9.8k | |
OpenSSL | =0.9.8l | |
OpenSSL | =0.9.8m | |
=0.9.8f | ||
=0.9.8g | ||
=0.9.8h | ||
=0.9.8i | ||
=0.9.8j | ||
=0.9.8k | ||
=0.9.8l | ||
=0.9.8m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0740 is classified as a denial of service vulnerability due to the potential crash caused by a NULL pointer dereference in OpenSSL.
CVE-2010-0740 affects OpenSSL versions 0.9.8f through 0.9.8m.
To fix CVE-2010-0740, you should upgrade to a non-affected version of OpenSSL, ideally to 0.9.8n or later.
CVE-2010-0740 is caused by a malformed record in a TLS connection that triggers a NULL pointer dereference in the ssl3_get_record function.
Yes, CVE-2010-0740 can be exploited remotely by an attacker sending a malformed TLS record.