CVE-2009-4355
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
14/01/2010
Last modified:
09/04/2025
Description
Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 0.9.8l (including) | |
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://cvs.openssl.org/chngview?cn=19068
- http://cvs.openssl.org/chngview?cn=19069
- http://cvs.openssl.org/chngview?cn=19167
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html
- http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
- http://marc.info/?l=bugtraq&m=127128920008563&w=2
- http://marc.info/?l=bugtraq&m=127128920008563&w=2
- http://secunia.com/advisories/38175
- http://secunia.com/advisories/38181
- http://secunia.com/advisories/38200
- http://secunia.com/advisories/38761
- http://secunia.com/advisories/39461
- http://secunia.com/advisories/42724
- http://secunia.com/advisories/42733
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049
- http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004
- http://www.debian.org/security/2010/dsa-1970
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A022
- http://www.openwall.com/lists/oss-security/2010/01/13/3
- http://www.ubuntu.com/usn/USN-884-1
- http://www.vupen.com/english/advisories/2010/0124
- http://www.vupen.com/english/advisories/2010/0839
- http://www.vupen.com/english/advisories/2010/0916
- https://bugzilla.redhat.com/show_bug.cgi?id=546707
- https://issues.rpath.com/browse/RPL-3157
- https://kb.bluecoat.com/index?page=content&id=SA50
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11260
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12168
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6678
- https://rhn.redhat.com/errata/RHSA-2010-0095.html
- http://cvs.openssl.org/chngview?cn=19068
- http://cvs.openssl.org/chngview?cn=19069
- http://cvs.openssl.org/chngview?cn=19167
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html
- http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
- http://marc.info/?l=bugtraq&m=127128920008563&w=2
- http://marc.info/?l=bugtraq&m=127128920008563&w=2
- http://secunia.com/advisories/38175
- http://secunia.com/advisories/38181
- http://secunia.com/advisories/38200
- http://secunia.com/advisories/38761
- http://secunia.com/advisories/39461
- http://secunia.com/advisories/42724
- http://secunia.com/advisories/42733
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049
- http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004
- http://www.debian.org/security/2010/dsa-1970
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A022
- http://www.openwall.com/lists/oss-security/2010/01/13/3
- http://www.ubuntu.com/usn/USN-884-1
- http://www.vupen.com/english/advisories/2010/0124
- http://www.vupen.com/english/advisories/2010/0839
- http://www.vupen.com/english/advisories/2010/0916
- https://bugzilla.redhat.com/show_bug.cgi?id=546707
- https://issues.rpath.com/browse/RPL-3157
- https://kb.bluecoat.com/index?page=content&id=SA50
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11260
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12168
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6678
- https://rhn.redhat.com/errata/RHSA-2010-0095.html