National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2010-0740 Detail

Description

The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number. NOTE: some of these details are obtained from third party information.

Source:  MITRE      Last Modified:  03/26/2010

Quick Info

CVE Dictionary Entry:
CVE-2010-0740
Original release date:
03/26/2010
Last revised:
09/18/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
5.0 MEDIUM
Vector:
(AV:N/AC:L/Au:N/C:N/I:N/A:P) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows disruption of service

Evaluator Impact

Per: http://www.openssl.org/news/secadv_20100324.txt 'Affected versions depend on the C compiler used with OpenSSL: - If 'short' is a 16-bit integer, this issue applies only to OpenSSL 0.9.8m. - Otherwise, this issue applies to OpenSSL 0.9.8f through 0.9.8m.'

Vendor Statements (disclaimer)

Official Statement from Red Hat (03/27/2010)

Not vulnerable. This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 3, 4, or 5.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc External Source CONFIRM http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html External Source APPLE APPLE-SA-2011-06-23-1
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html External Source FEDORA FEDORA-2010-5744
http://marc.info/?l=bugtraq&m=127128920008563&w=2 External Source HP SSRT100058
http://marc.info/?l=bugtraq&m=127557640302499&w=2 External Source HP SSRT100108
http://support.apple.com/kb/HT4723 External Source CONFIRM http://support.apple.com/kb/HT4723
http://www.mandriva.com/security/advisories?name=MDVSA-2010:076 External Source MANDRIVA MDVSA-2010:076
http://www.openssl.org/news/secadv_20100324.txt Patch; Vendor Advisory External Source CONFIRM http://www.openssl.org/news/secadv_20100324.txt
http://www.securityfocus.com/archive/1/archive/1/516397/100/0/threaded External Source BUGTRAQ 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
http://www.securitytracker.com/id?1023748 External Source SECTRACK 1023748
http://www.vmware.com/security/advisories/VMSA-2011-0003.html External Source CONFIRM http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html External Source CONFIRM http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
http://www.vupen.com/english/advisories/2010/0710 Patch; Vendor Advisory External Source VUPEN ADV-2010-0710
http://www.vupen.com/english/advisories/2010/0839 External Source VUPEN ADV-2010-0839
http://www.vupen.com/english/advisories/2010/0933 External Source VUPEN ADV-2010-0933
http://www.vupen.com/english/advisories/2010/1216 External Source VUPEN ADV-2010-1216
https://kb.bluecoat.com/index?page=content&id=SA50 External Source CONFIRM https://kb.bluecoat.com/index?page=content&id=SA50
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html External Source MLIST [syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html External Source MLIST [syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11731 External Source OVAL oval:org.mitre.oval:def:11731

References to Check Content

Identifier:
oval:org.mitre.oval:def:11731
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:11731

Technical Details

Vulnerability Type (View All)

Change History 4 change records found - show changes