#VU33339 Use-after-free in OpenSSL - CVE-2009-1379


| Updated: 2020-08-04

Vulnerability identifier: #VU33339

Vulnerability risk: Medium

CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2009-1379

CWE-ID: CWE-416

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
OpenSSL
Server applications / Encryption software

Vendor: OpenSSL Software Foundation

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate. A remote attackers can cause a denial of service (openssl s_client crash) and possibly have unspecified other impact.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation
Update to version 1.0.0a.

Vulnerable software versions

OpenSSL: 1.0.0


External links
https:ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-009.txt.asc
https://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444
https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
https://lists.vmware.com/pipermail/security-announce/2010/000082.html
https://rt.openssl.org/Ticket/Display.html?id=1923&user=guest&pass=guest
https://secunia.com/advisories/35416
https://secunia.com/advisories/35461
https://secunia.com/advisories/35571
https://secunia.com/advisories/35729
https://secunia.com/advisories/36533
https://secunia.com/advisories/37003
https://secunia.com/advisories/38761
https://secunia.com/advisories/38794
https://secunia.com/advisories/38834
https://secunia.com/advisories/42724
https://secunia.com/advisories/42733
https://security.gentoo.org/glsa/glsa-200912-01.xml
https://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049
https://sourceforge.net/mailarchive/message.php?msg_name=4AD43807.7080105%40users.sourceforge.net
https://voodoo-circle.sourceforge.net/sa/sa-20091012-01.html
https://www.openwall.com/lists/oss-security/2009/05/18/4
https://www.redhat.com/support/errata/RHSA-2009-1335.html
https://www.securityfocus.com/bid/35138
https://www.securitytracker.com/id?1022241
https://www.ubuntu.com/usn/USN-792-1
https://www.vupen.com/english/advisories/2009/1377
https://www.vupen.com/english/advisories/2010/0528
https://exchange.xforce.ibmcloud.com/vulnerabilities/50661
https://kb.bluecoat.com/index?page=content&id=SA50
https://launchpad.net/bugs/cve/2009-1379
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6848
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9744


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability