First published: Wed Nov 03 2010(Updated: )
A race condition flaw has been found in the OpenSSL TLS server extension code parsing, which on affected servers, could lead to arbitrary code execution. All versions of OpenSSL supporting TLS extensions contain this vulnerability including OpenSSL 0.9.8j and later and 1.0.0, 1.0.0a releases. Any OpenSSL based TLS server is vulnerable if it is multi-threaded and uses OpenSSL's internal caching mechanism. Servers that are multi-process and/or disable internal session caching are NOT affected.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL | =0.9.8m | |
OpenSSL | =0.9.8n | |
OpenSSL | =0.9.8g | |
OpenSSL | =0.9.8k | |
OpenSSL | =0.9.8j | |
OpenSSL | =0.9.8l | |
OpenSSL | =1.0.0 | |
OpenSSL | =0.9.8o | |
OpenSSL | =0.9.8i | |
OpenSSL | =0.9.8f | |
OpenSSL | =1.0.0a | |
OpenSSL | =0.9.8h |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3864 is classified as a critical severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2010-3864, upgrade to a version of OpenSSL that is not affected, such as versions released after the security fix was applied.
All versions of OpenSSL that support TLS extensions prior to the security patch are affected, including 0.9.8j and later and 1.0.0 and 1.0.0a releases.
CVE-2010-3864 is a race condition vulnerability found in the OpenSSL TLS server extension code parsing.
Yes, CVE-2010-3864 can potentially be exploited remotely, allowing attackers to execute arbitrary code on affected servers.