CVE-2006-4343

Scores

EPSS

0.069very_low6.9%
0%20%40%60%80%100%

Percentile: 6.9%

CVSS

4.3medium2.0
0246810

CVSS Score: 4.3/10

All CVSS Scores

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Description

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhat

CWEs

CWE-476

Related Vulnerabilities

Exploits

Exploit ID: 10071

Source: exploitdb

URL: https://www.exploit-db.com/exploits/10071

Exploit ID: 10579

Source: exploitdb

URL: https://www.exploit-db.com/exploits/10579

Exploit ID: 12334

Source: exploitdb

URL: https://www.exploit-db.com/exploits/12334

Exploit ID: 24487

Source: exploitdb

URL: https://www.exploit-db.com/exploits/24487

Exploit ID: 28726

Source: exploitdb

URL: https://www.exploit-db.com/exploits/28726

Exploit ID: 34427

Source: exploitdb

URL: https://www.exploit-db.com/exploits/34427

Exploit ID: 4773

Source: exploitdb

URL: https://www.exploit-db.com/exploits/4773

Exploit ID: 8720

Source: exploitdb

URL: https://www.exploit-db.com/exploits/8720

Exploit ID: CVE-2009-3555

Source: github-poc

URL: https://github.com/johnwchadwick/cve-2009-3555-test-server

Exploit ID: CVE-2014-3570

Source: github-poc

URL: https://github.com/uthrasri/CVE-2014-3570_G2.5_openssl_no_patch

Exploit ID: CVE-2014-8275

Source: github-poc

URL: https://github.com/uthrasri/CVE-2014-8275_openssl_g2.5

Exploit ID: CVE-2015-0205

Source: github-poc

URL: https://github.com/saurabh2088/OpenSSL_1_0_1g_CVE-2015-0205

Recommendations

Source: nvd

All OpenSSL 0.9.8 users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=dev-libs/openssl-0.9.8d”

All OpenSSL 0.9.7 users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=dev-libs/openssl-0.9.7l”

URL: http://security.gentoo.org/glsa/glsa-200610-11.xml

Vulnerable Software (21)

Type: Configuration

Product: openssl

Operating System: rhel 2.1

Trait:
{  "fixed": "0.9.6b-46"}

Source: redhat

Type: Configuration

Product: openssl

Operating System: rhel 3

Trait:
{  "fixed": "0.9.7a-33.21"}

Source: redhat

Type: Configuration

Product: openssl

Operating System: rhel 4

Trait:
{  "fixed": "0.9.7a-43.14"}

Source: redhat

Type: Configuration

Product: openssl

Operating System: debian

Trait:
{  "fixed": "0.9.8c-2"}

Source: debian

Type: Configuration

Product: openssl095a

Operating System: rhel 2.1

Trait:
{  "fixed": "0.9.5a-32"}

Source: redhat

Type: Configuration

Product: openssl096

Operating System: rhel 2.1

Trait:
{  "fixed": "0.9.6-32"}

Source: redhat

Type: Configuration

Product: openssl096

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Product: openssl096b

Operating System: rhel 3

Trait:
{  "fixed": "0.9.6b-16.46"}

Source: redhat

Type: Configuration

Product: openssl096b

Operating System: rhel 4

Trait:
{  "fixed": "0.9.6b-22.46"}

Source: redhat

Type: Configuration

Product: openssl097

Operating System: debian

Trait:
{  "fixed": "0.9.7k-2"}

Source: debian

Type: Configuration

Product: rhn-solaris-bootstrap

Operating System: rhel

Trait:
{  "fixed": "5.0.2-3"}

Source: redhat

Type: Configuration

Product: rhn-solaris-bootstrap

Operating System: rhel

Trait:
{  "fixed": "5.0.2-3"}

Source: redhat

Type: Configuration

Product: rhn-solaris-bootstrap

Operating System: rhel

Trait:
{  "fixed": "5.0.2-3"}

Source: redhat

Type: Configuration

Product: rhn-solaris-bootstrap

Operating System: rhel

Trait:
{  "fixed": "5.1.1-3"}

Source: redhat

Type: Configuration

Product: rhn_solaris_bootstrap_5_0_2_3

Operating System: rhel

Trait:
{  "fixed": "1-0"}

Source: redhat

Type: Configuration

Product: rhn_solaris_bootstrap_5_0_2_3

Operating System: rhel

Trait:
{  "fixed": "1-0"}

Source: redhat

Type: Configuration

Product: rhn_solaris_bootstrap_5_0_2_3

Operating System: rhel

Trait:
{  "fixed": "1-0"}

Source: redhat

Type: Configuration

Product: rhn_solaris_bootstrap_5_1_1_3

Operating System: rhel

Trait:
{  "fixed": "1-0"}

Source: redhat

Type: Configuration

Vendor: *

Product: debian_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: *

Product: openssl

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",  ...

Source: nvd