|Category:||Denial of Service|
|Title:||OpenSSL 0.9.6e DoS Vulnerability|
|Summary:||OpenSSL is prone to a denial of service (DoS) vulnerability.|
OpenSSL is prone to a denial of service (DoS) vulnerability.
The use of assertions when detecting buffer overflow attacks allowed
remote attackers to cause a denial of service (crash) by sending certain messages to cause OpenSSL to
abort from a failed assertion, as demonstrated using SSLv2 CLIENT_MASTER_KEY messages, which were not
properly handled in s2_srvr.c.
OpenSSL version 0.9.6e.
Update to version 0.9.6f or later.
Common Vulnerability Exposure (CVE) ID: CVE-2002-1568|
Bugtraq: 20031002 New OpenSSL remote vulnerability (issue date 2003/10/02) (Google Search)
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.