4.3

CVE-2006-4343

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OpenSSLOpenSSL Version0.9.7
OpenSSLOpenSSL Version0.9.7a
OpenSSLOpenSSL Version0.9.7b
OpenSSLOpenSSL Version0.9.7c
OpenSSLOpenSSL Version0.9.7d
OpenSSLOpenSSL Version0.9.7e
OpenSSLOpenSSL Version0.9.7f
OpenSSLOpenSSL Version0.9.7g
OpenSSLOpenSSL Version0.9.7h
OpenSSLOpenSSL Version0.9.7i
OpenSSLOpenSSL Version0.9.7j
OpenSSLOpenSSL Version0.9.7k
OpenSSLOpenSSL Version0.9.8
OpenSSLOpenSSL Version0.9.8a
OpenSSLOpenSSL Version0.9.8b
OpenSSLOpenSSL Version0.9.8c
DebianDebian Linux Version3.1
CanonicalUbuntu Linux Version5.04
CanonicalUbuntu Linux Version5.10
CanonicalUbuntu Linux Version6.06 SwEditionlts
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 7.85% 0.917
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-476 NULL Pointer Dereference

The product dereferences a pointer that it expects to be valid but is NULL.

http://securitytracker.com/id?1017522
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/22083
Third Party Advisory
VDB Entry
http://marc.info/?l=bugtraq&m=130497311408250&w=2
Third Party Advisory
Mailing List
http://openvpn.net/changelog.html
Third Party Advisory
http://www.vupen.com/english/advisories/2007/0343
Third Party Advisory
Permissions Required
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Third Party Advisory
US Government Resource
http://www.vupen.com/english/advisories/2006/4750
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2007/2783
Third Party Advisory
Permissions Required
http://www.securityfocus.com/bid/28276
Third Party Advisory
VDB Entry
http://www.vupen.com/english/advisories/2006/3936
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2006/4417
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2007/1401
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2008/0905/references
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2006/4401
Third Party Advisory
Permissions Required
http://securitytracker.com/id?1016943
Third Party Advisory
VDB Entry
http://www.vupen.com/english/advisories/2006/3820
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2006/3860
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2006/3869
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2006/3902
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2006/4036
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2006/4264
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2006/4443
Third Party Advisory
Permissions Required
http://www.kb.cert.org/vuls/id/386964
Patch
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/20246
Patch
Third Party Advisory
VDB Entry
http://www.vupen.com/english/advisories/2007/1973
Third Party Advisory
Permissions Required
https://www.exploit-db.com/exploits/4773
Third Party Advisory
VDB Entry