CVE-2009-1378

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."

References

ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-009.txt.asc

http://cvs.openssl.org/chngview?cn=18188

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444

http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html

http://lists.vmware.com/pipermail/security-announce/2010/000082.html

http://marc.info/?l=openssl-dev&m=124247679213944&w=2

http://marc.info/?l=openssl-dev&m=124263491424212&w=2

http://rt.openssl.org/Ticket/Display.html?id=1931&user=guest&pass=guest

http://secunia.com/advisories/35128

http://secunia.com/advisories/35416

http://secunia.com/advisories/35461

http://secunia.com/advisories/35571

http://secunia.com/advisories/35729

http://secunia.com/advisories/36533

http://secunia.com/advisories/37003

http://secunia.com/advisories/38761

http://secunia.com/advisories/38794

http://secunia.com/advisories/38834

http://secunia.com/advisories/42724

http://secunia.com/advisories/42733

http://security.gentoo.org/glsa/glsa-200912-01.xml

http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049

http://sourceforge.net/mailarchive/message.php?msg_name=4AD43807.7080105%40users.sourceforge.net

http://voodoo-circle.sourceforge.net/sa/sa-20091012-01.html

http://www.mandriva.com/security/advisories?name=MDVSA-2009:120

http://www.openwall.com/lists/oss-security/2009/05/18/1

http://www.redhat.com/support/errata/RHSA-2009-1335.html

http://www.securityfocus.com/bid/35001

http://www.securitytracker.com/id?1022241

http://www.ubuntu.com/usn/USN-792-1

http://www.vupen.com/english/advisories/2009/1377

http://www.vupen.com/english/advisories/2010/0528

https://kb.bluecoat.com/index?page=content&id=SA50

https://launchpad.net/bugs/cve/2009-1378

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11309

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7229

https://www.exploit-db.com/exploits/8720

Details

Source: MITRE

Published: 2009-05-19

Updated: 2017-09-29

Type: CWE-399

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions up to 0.9.8k (inclusive)

cpe:2.3:a:openssl_project:openssl:0.9.8c-1:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8c-2:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8c-3:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8c-4:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8c-5:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8c-6:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8c-7:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8c-8:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8c-9:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8d-1:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8d-2:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8d-3:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8d-4:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8d-5:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8d-6:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8d-7:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8d-8:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8d-9:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8e-1:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8e-2:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8e-3:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8e-4:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8e-5:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8e-6:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8e-7:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8e-8:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8e-9:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8f:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8f-1:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8f-2:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8f-3:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8f-4:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8f-5:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8f-6:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8f-7:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8f-8:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8f-9:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8g:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8g-1:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8g-2:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8g-3:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8g-4:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8g-5:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8g-6:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8g-7:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8g-8:*:*:*:*:*:*:*

cpe:2.3:a:openssl_project:openssl:0.9.8g-9:*:*:*:*:*:*:*

Tenable Plugins

View all (26 total)

IDNameProductFamilySeverity
127201NewStart CGSL CORE 5.04 / MAIN 5.04 : openssl Multiple Vulnerabilities (NS-SA-2019-0033)NessusNewStart CGSL Local Security Checks
critical
127177NewStart CGSL CORE 5.04 / MAIN 5.04 : openssl098e Multiple Vulnerabilities (NS-SA-2019-0020)NessusNewStart CGSL Local Security Checks
critical
125000EulerOS Virtualization 3.0.1.0 : openssl (EulerOS-SA-2019-1547)NessusHuawei Local Security Checks
medium
89740VMware ESX / ESXi Third-Party Libraries and Components (VMSA-2010-0009) (remote check)NessusVMware ESX Local Security Checks
critical
89737VMware ESX Third-Party Libraries Multiple Vulnerabilities (VMSA-2010-0004) (remote check)NessusVMware ESX Local Security Checks
high
63892RHEL 5 : openssl (RHSA-2009:1335)NessusRed Hat Local Security Checks
medium
60658Scientific Linux Security Update : openssl on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
17765OpenSSL < 0.9.8l Multiple VulnerabilitiesNessusWeb Servers
medium
46765VMSA-2010-0009 : ESXi ntp and ESX Service Console third-party updatesNessusVMware ESX Local Security Checks
high
46015HP System Management Homepage < 6.0.0.96 / 6.0.0-95 Multiple VulnerabilitiesNessusWeb Servers
critical
44993VMSA-2010-0004 : ESX Service Console and vMA third-party updatesNessusVMware ESX Local Security Checks
high
44946Slackware 11.0 / 12.0 / 12.1 / 12.2 / 13.0 / current : openssl (SSA:2010-060-02)NessusSlackware Local Security Checks
critical
43785CentOS 5 : openssl (CESA-2009:1335)NessusCentOS Local Security Checks
medium
42996Mandriva Linux Security Advisory : openssl (MDVSA-2009:310)NessusMandriva Local Security Checks
medium
42968GLSA-200912-01 : OpenSSL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
41572SuSE 10 Security Update : OpenSSL (ZYPP Patch Number 6267)NessusSuSE Local Security Checks
medium
41424SuSE 11 Security Update : OpenSSL (SAT Patch Number 909)NessusSuSE Local Security Checks
medium
40261openSUSE Security Update : libopenssl-devel (libopenssl-devel-907)NessusSuSE Local Security Checks
medium
40034openSUSE Security Update : libopenssl-devel (libopenssl-devel-907)NessusSuSE Local Security Checks
medium
39534Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : openssl vulnerabilities (USN-792-1)NessusUbuntu Local Security Checks
medium
39476Fedora 11 : openssl-0.9.8k-5.fc11 (2009-5452)NessusFedora Local Security Checks
medium
39475Fedora 9 : openssl-0.9.8g-9.14.fc9 (2009-5423)NessusFedora Local Security Checks
medium
39474Fedora 10 : openssl-0.9.8g-14.fc10 (2009-5412)NessusFedora Local Security Checks
medium
38966FreeBSD : openssl -- denial of service in DTLS implementation (82b55df8-4d5a-11de-8811-0030843d3802)NessusFreeBSD Local Security Checks
medium
38923openSUSE 10 Security Update : libopenssl-devel (libopenssl-devel-6268)NessusSuSE Local Security Checks
medium
38864Mandriva Linux Security Advisory : openssl (MDVSA-2009:120)NessusMandriva Local Security Checks
medium