National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2008-1678 Detail

Description

Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm.

Source:  MITRE      Last Modified:  07/10/2008

Quick Info

CVE Dictionary Entry:
CVE-2008-1678
Original release date:
07/10/2008
Last revised:
09/28/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
5.0 MEDIUM
Vector:
(AV:N/AC:L/Au:N/C:N/I:N/A:P) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (05/28/2009)

Not vulnerable. This issue did not affect the versions of mod_ssl or httpd as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5 prior to 5.3. In Red Hat Enterprise Linux 5.3, OpenSSL packages were rebased to upstream version 0.9.8e via RHBA-2009:0181 (https://rhn.redhat.com/errata/RHBA-2009-0181.html), introducing this problem in Red Hat Enterprise Linux 5. Updated httpd packages were released via: https://rhn.redhat.com/errata/RHSA-2009-1075.html

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://bugs.gentoo.org/show_bug.cgi?id=222643 External Source CONFIRM http://bugs.gentoo.org/show_bug.cgi?id=222643
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html External Source APPLE APPLE-SA-2008-10-09
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html External Source SUSE SUSE-SR:2008:024
http://marc.info/?l=openssl-dev&m=121060672602371&w=2 Exploit External Source MLIST [openssl-dev] 20080512 possible memory leak in zlib compression
http://security.gentoo.org/glsa/glsa-200807-06.xml External Source GENTOO GLSA-200807-06
http://securityreason.com/securityalert/3981 External Source SREASON 3981
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049 External Source SLACKWARE SSA:2010-060-02
http://support.apple.com/kb/HT3216 External Source CONFIRM http://support.apple.com/kb/HT3216
http://svn.apache.org/viewvc?view=rev&revision=654119 External Source CONFIRM http://svn.apache.org/viewvc?view=rev&revision=654119
http://www.mandriva.com/security/advisories?name=MDVSA-2009:124 External Source MANDRIVA MDVSA-2009:124
http://www.redhat.com/support/errata/RHSA-2009-1075.html External Source REDHAT RHSA-2009:1075
http://www.securityfocus.com/bid/31681 External Source BID 31681
http://www.securityfocus.com/bid/31692 External Source BID 31692
http://www.ubuntu.com/usn/USN-731-1 External Source UBUNTU USN-731-1
http://www.vupen.com/english/advisories/2008/2780 External Source VUPEN ADV-2008-2780
https://bugs.edge.launchpad.net/bugs/186339 External Source CONFIRM https://bugs.edge.launchpad.net/bugs/186339
https://bugs.edge.launchpad.net/bugs/224945 Exploit External Source CONFIRM https://bugs.edge.launchpad.net/bugs/224945
https://bugzilla.redhat.com/show_bug.cgi?id=447268 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=447268
https://exchange.xforce.ibmcloud.com/vulnerabilities/43948 External Source XF openssl-libssl-dos(43948)
https://issues.apache.org/bugzilla/show_bug.cgi?id=44975 External Source CONFIRM https://issues.apache.org/bugzilla/show_bug.cgi?id=44975
https://kb.bluecoat.com/index?page=content&id=SA50 External Source CONFIRM https://kb.bluecoat.com/index?page=content&id=SA50
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9754 External Source OVAL oval:org.mitre.oval:def:9754
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00055.html External Source FEDORA FEDORA-2008-6393

References to Check Content

Identifier:
oval:org.mitre.oval:def:9754
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:9754

Technical Details

Vulnerability Type (View All)

  • Resource Management Errors (CWE-399)

Change History 3 change records found - show changes