Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8v7x-8cw9-9c5c

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.

Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 94%
0.13977
Средний

Связанные уязвимости

ubuntu
больше 17 лет назад

Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.

redhat
больше 17 лет назад

Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.

nvd
больше 17 лет назад

Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.

debian
больше 17 лет назад

Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS s ...

fstec
около 17 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 94%
0.13977
Средний