Описание
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 1.0.1f-1ubuntu3 |
| esm-infra-legacy/trusty | released | 1.0.1f-1ubuntu2.1 |
| lucid | not-affected | code not present |
| precise | released | 1.0.1-4ubuntu5.13 |
| quantal | released | 1.0.1c-3ubuntu2.8 |
| saucy | released | 1.0.1e-3ubuntu1.3 |
| trusty | released | 1.0.1f-1ubuntu2.1 |
| trusty/esm | released | 1.0.1f-1ubuntu2.1 |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | code not present |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [code not present]] |
| lucid | DNE | |
| precise | not-affected | code not present |
| quantal | not-affected | code not present |
| saucy | not-affected | code not present |
| trusty | not-affected | code not present |
| trusty/esm | DNE | trusty was not-affected [code not present] |
| upstream | needs-triage |
Показывать по
Ссылки на источники
4 Medium
CVSS2
Связанные уязвимости
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL ...
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
4 Medium
CVSS2