First published: Wed Nov 03 2010(Updated: )
A race condition flaw has been found in the OpenSSL TLS server extension code parsing, which on affected servers, could lead to arbitrary code execution. All versions of OpenSSL supporting TLS extensions contain this vulnerability including OpenSSL 0.9.8j and later and 1.0.0, 1.0.0a releases. Any OpenSSL based TLS server is vulnerable if it is multi-threaded and uses OpenSSL's internal caching mechanism. Servers that are multi-process and/or disable internal session caching are NOT affected.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | =0.9.8f | |
OpenSSL OpenSSL | =0.9.8g | |
OpenSSL OpenSSL | =0.9.8h | |
OpenSSL OpenSSL | =0.9.8i | |
OpenSSL OpenSSL | =0.9.8j | |
OpenSSL OpenSSL | =0.9.8k | |
OpenSSL OpenSSL | =0.9.8l | |
OpenSSL OpenSSL | =0.9.8m | |
OpenSSL OpenSSL | =0.9.8n | |
OpenSSL OpenSSL | =0.9.8o | |
OpenSSL OpenSSL | =1.0.0 | |
OpenSSL OpenSSL | =1.0.0a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.