First published: Mon Apr 14 2014(Updated: )
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL | <=1.0.1g | |
MariaDB | >=10.0.0<10.0.13 | |
Fedora | =20 | |
Fedora | =19 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Workstation Extension | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-5298 has a moderate severity level due to its potential for data injection and denial of service in multithreaded environments.
To fix CVE-2010-5298, upgrade OpenSSL to version 1.0.1h or later and ensure that SSL_MODE_RELEASE_BUFFERS is not enabled.
CVE-2010-5298 affects OpenSSL through version 1.0.1g and several specific versions of MariaDB and SUSE products.
Yes, CVE-2010-5298 can be exploited remotely by attackers making use of vulnerable SSL connections.
The primary impact of CVE-2010-5298 includes the ability to inject data across sessions and potential denial of service via use-after-free errors.