The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.
http://cvs.openssl.org/chngview?cn=21337
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
http://marc.info/?l=bugtraq&m=132750648501816&w=2
http://marc.info/?l=bugtraq&m=133226187115472&w=2
http://openssl.org/news/secadv_20110906.txt
https://bugzilla.redhat.com/show_bug.cgi?id=736079
http://secunia.com/advisories/57353
http://support.apple.com/kb/HT5784
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
http://www.mandriva.com/security/advisories?name=MDVSA-2011:137