CVE-2006-4343

Scores

EPSS

0.256low25.6%
0%20%40%60%80%100%

Percentile: 25.6%

CVSS

4.3medium2.0
0246810

CVSS Score: 4.3/10

All CVSS Scores

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Description

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhat

CWEs

CWE-476

Related Vulnerabilities

Exploits

Exploit ID: 28726

Source: exploitdb

URL: https://www.exploit-db.com/exploits/28726

Exploit ID: 4773

Source: exploitdb

URL: https://www.exploit-db.com/exploits/4773

Recommendations

Source: nvd

Upgrade or apply a patch from the vendorPatches have been released to address this issue. Please see the Systems Affected section of this document for more information.Users or redistributors who compile OpenSSL from the original source code distribution are encouraged to review OpenSSL Security Advisory [28th September 2006] and upgrade to the appropriate fixed version of the software.

URL: http://www.kb.cert.org/vuls/id/386964

Source: nvd

All OpenSSL 0.9.8 users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=dev-libs/openssl-0.9.8d”

All OpenSSL 0.9.7 users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=dev-libs/openssl-0.9.7l”

URL: http://security.gentoo.org/glsa/glsa-200610-11.xml

Vulnerable Software (21)

Type: Configuration

Product: openssl

Operating System: rhel 2.1

Trait:
{  "fixed": "0.9.6b-46"}

Source: redhat

Type: Configuration

Product: openssl

Operating System: rhel 3

Trait:
{  "fixed": "0.9.7a-33.21"}

Source: redhat

Type: Configuration

Product: openssl

Operating System: rhel 4

Trait:
{  "fixed": "0.9.7a-43.14"}

Source: redhat

Type: Configuration

Product: openssl

Operating System: debian

Trait:
{  "fixed": "0.9.8c-2"}

Source: debian

Type: Configuration

Product: openssl095a

Operating System: rhel 2.1

Trait:
{  "fixed": "0.9.5a-32"}

Source: redhat

Type: Configuration

Product: openssl096

Operating System: rhel 2.1

Trait:
{  "fixed": "0.9.6-32"}

Source: redhat

Type: Configuration

Product: openssl096

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Product: openssl096b

Operating System: rhel 3

Trait:
{  "fixed": "0.9.6b-16.46"}

Source: redhat

Type: Configuration

Product: openssl096b

Operating System: rhel 4

Trait:
{  "fixed": "0.9.6b-22.46"}

Source: redhat

Type: Configuration

Product: openssl097

Operating System: debian

Trait:
{  "fixed": "0.9.7k-2"}

Source: debian