CVE-2010-5298
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
- Published date
- 2014-04-14T22:38Z
- Last modification date
- 2022-08-29T20:53Z
- Assigner
- cve@mitre.org
- Problem type
- CWE-362
Name | URL | Source | Tags |
---|---|---|---|
[oss-security] 20140412 Use-after-free race condition,in OpenSSL's read buffer | http://openwall.com/lists/oss-security/2014/04/13/1 | MLIST | Mailing List, Patch |
http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup | http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup | CONFIRM | Broken Link |
http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sig | http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sig | CONFIRM | Patch, Third Party Advisory |
http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse | http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse | MISC | Third Party Advisory |
https://rt.openssl.org/Ticket/Display.html?id=3265&user=guest&pass=guest | https://rt.openssl.org/Ticket/Display.html?id=3265&user=guest&pass=guest | MISC | Broken Link |
[5.5] 004: SECURITY FIX: April 12, 2014 | http://www.openbsd.org/errata55.html#004_openssl | OPENBSD | Third Party Advisory |
https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest | https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest | MISC | Broken Link |
66801 | http://www.securityfocus.com/bid/66801 | BID | Third Party Advisory, VDB Entry |
http://www.openssl.org/news/secadv_20140605.txt | http://www.openssl.org/news/secadv_20140605.txt | CONFIRM | Third Party Advisory |
https://kb.bluecoat.com/index?page=content&id=SA80 | https://kb.bluecoat.com/index?page=content&id=SA80 | CONFIRM | Broken Link |
20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl | CISCO | Third Party Advisory |
http://www.blackberry.com/btsc/KB36051 | http://www.blackberry.com/btsc/KB36051 | CONFIRM | Broken Link |
http://www-01.ibm.com/support/docview.wss?uid=swg21676035 | http://www-01.ibm.com/support/docview.wss?uid=swg21676035 | CONFIRM | Broken Link |
59438 | http://secunia.com/advisories/59438 | SECUNIA | Not Applicable |
59301 | http://secunia.com/advisories/59301 | SECUNIA | Not Applicable |
59450 | http://secunia.com/advisories/59450 | SECUNIA | Not Applicable |
59721 | http://secunia.com/advisories/59721 | SECUNIA | Not Applicable |
http://www-01.ibm.com/support/docview.wss?uid=swg21677695 | http://www-01.ibm.com/support/docview.wss?uid=swg21677695 | CONFIRM | Third Party Advisory |
59655 | http://secunia.com/advisories/59655 | SECUNIA | Not Applicable |
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm | http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm | CONFIRM | Third Party Advisory |
59162 | http://secunia.com/advisories/59162 | SECUNIA | Not Applicable |
http://www-01.ibm.com/support/docview.wss?uid=swg21676655 | http://www-01.ibm.com/support/docview.wss?uid=swg21676655 | CONFIRM | Third Party Advisory |
58939 | http://secunia.com/advisories/58939 | SECUNIA | Not Applicable |
59666 | http://secunia.com/advisories/59666 | SECUNIA | Not Applicable |
http://www-01.ibm.com/support/docview.wss?uid=swg21677828 | http://www-01.ibm.com/support/docview.wss?uid=swg21677828 | CONFIRM | Third Party Advisory |
59490 | http://secunia.com/advisories/59490 | SECUNIA | Not Applicable |
http://www-01.ibm.com/support/docview.wss?uid=swg21676062 | http://www-01.ibm.com/support/docview.wss?uid=swg21676062 | CONFIRM | Third Party Advisory |
https://kc.mcafee.com/corporate/index?page=content&id=SB10075 | https://kc.mcafee.com/corporate/index?page=content&id=SB10075 | CONFIRM | Broken Link |
http://www-01.ibm.com/support/docview.wss?uid=swg21676419 | http://www-01.ibm.com/support/docview.wss?uid=swg21676419 | CONFIRM | Third Party Advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg21678167 | http://www-01.ibm.com/support/docview.wss?uid=swg21678167 | CONFIRM | Third Party Advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg21673137 | http://www-01.ibm.com/support/docview.wss?uid=swg21673137 | CONFIRM | Broken Link |
http://www-01.ibm.com/support/docview.wss?uid=swg21677527 | http://www-01.ibm.com/support/docview.wss?uid=swg21677527 | CONFIRM | Broken Link |
59669 | http://secunia.com/advisories/59669 | SECUNIA | Not Applicable |
59413 | http://secunia.com/advisories/59413 | SECUNIA | Not Applicable |
59300 | http://secunia.com/advisories/59300 | SECUNIA | Not Applicable |
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html | http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html | CONFIRM | Third Party Advisory |
http://www.fortiguard.com/advisory/FG-IR-14-018/ | http://www.fortiguard.com/advisory/FG-IR-14-018/ | CONFIRM | Third Party Advisory |
59342 | http://secunia.com/advisories/59342 | SECUNIA | Not Applicable |
http://www.vmware.com/security/advisories/VMSA-2014-0012.html | http://www.vmware.com/security/advisories/VMSA-2014-0012.html | CONFIRM | Third Party Advisory |
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities | http://seclists.org/fulldisclosure/2014/Dec/23 | FULLDISC | Mailing List, Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html | http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html | CONFIRM | Third Party Advisory |
MDVSA-2015:062 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 | MANDRIVA | Broken Link |
HPSBMU03055 | http://marc.info/?l=bugtraq&m=140431828824371&w=2 | HP | Mailing List, Third Party Advisory |
HPSBHF03052 | http://marc.info/?l=bugtraq&m=141658880509699&w=2 | HP | Mailing List, Third Party Advisory |
HPSBMU03051 | http://marc.info/?l=bugtraq&m=140448122410568&w=2 | HP | Mailing List, Third Party Advisory |
HPSBMU03074 | http://marc.info/?l=bugtraq&m=140621259019789&w=2 | HP | Mailing List, Third Party Advisory |
HPSBGN03068 | http://marc.info/?l=bugtraq&m=140544599631400&w=2 | HP | Mailing List, Third Party Advisory |
HPSBMU03057 | http://marc.info/?l=bugtraq&m=140389274407904&w=2 | HP | Mailing List, Third Party Advisory |
HPSBMU03076 | http://marc.info/?l=bugtraq&m=140904544427729&w=2 | HP | Mailing List, Third Party Advisory |
HPSBMU03056 | http://marc.info/?l=bugtraq&m=140389355508263&w=2 | HP | Mailing List, Third Party Advisory |
HPSBMU03062 | http://marc.info/?l=bugtraq&m=140752315422991&w=2 | HP | Mailing List, Third Party Advisory |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 | CONFIRM | Third Party Advisory |
SUSE-SU-2015:0743 | http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html | SUSE | Mailing List, Third Party Advisory |
https://www.novell.com/support/kb/doc.php?id=7015271 | https://www.novell.com/support/kb/doc.php?id=7015271 | CONFIRM | Third Party Advisory |
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 | CONFIRM | Broken Link |
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 | CONFIRM | Broken Link |
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 | CONFIRM | Broken Link |
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 | CONFIRM | Broken Link |
http://www-01.ibm.com/support/docview.wss?uid=swg21683332 | http://www-01.ibm.com/support/docview.wss?uid=swg21683332 | CONFIRM | Third Party Advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg21677836 | http://www-01.ibm.com/support/docview.wss?uid=swg21677836 | CONFIRM | Third Party Advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg21676889 | http://www-01.ibm.com/support/docview.wss?uid=swg21676889 | CONFIRM | Broken Link |
http://www-01.ibm.com/support/docview.wss?uid=swg21676879 | http://www-01.ibm.com/support/docview.wss?uid=swg21676879 | CONFIRM | Broken Link |
http://www-01.ibm.com/support/docview.wss?uid=swg21676529 | http://www-01.ibm.com/support/docview.wss?uid=swg21676529 | CONFIRM | Third Party Advisory |
http://www.vmware.com/security/advisories/VMSA-2014-0006.html | http://www.vmware.com/security/advisories/VMSA-2014-0006.html | CONFIRM | Third Party Advisory |
MDVSA-2014:090 | http://www.mandriva.com/security/advisories?name=MDVSA-2014:090 | MANDRIVA | Broken Link |
http://www.ibm.com/support/docview.wss?uid=swg24037783 | http://www.ibm.com/support/docview.wss?uid=swg24037783 | CONFIRM | Third Party Advisory |
http://www.ibm.com/support/docview.wss?uid=swg21676356 | http://www.ibm.com/support/docview.wss?uid=swg21676356 | CONFIRM | Third Party Advisory |
http://support.citrix.com/article/CTX140876 | http://support.citrix.com/article/CTX140876 | CONFIRM | Third Party Advisory |
GLSA-201407-05 | http://security.gentoo.org/glsa/glsa-201407-05.xml | GENTOO | Third Party Advisory |
59440 | http://secunia.com/advisories/59440 | SECUNIA | Not Applicable |
59437 | http://secunia.com/advisories/59437 | SECUNIA | Not Applicable |
59287 | http://secunia.com/advisories/59287 | SECUNIA | Not Applicable |
58977 | http://secunia.com/advisories/58977 | SECUNIA | Not Applicable |
58713 | http://secunia.com/advisories/58713 | SECUNIA | Not Applicable |
58337 | http://secunia.com/advisories/58337 | SECUNIA | Not Applicable |
FEDORA-2014-9308 | http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html | FEDORA | Mailing List, Third Party Advisory |
FEDORA-2014-9301 | http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html | FEDORA | Mailing List, Third Party Advisory |
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 | http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 | CONFIRM | Permissions Required |
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 | CONFIRM | Third Party Advisory |
http://advisories.mageia.org/MGASA-2014-0187.html | http://advisories.mageia.org/MGASA-2014-0187.html | CONFIRM | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html | http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html | CONFIRM | Third Party Advisory |
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities | http://www.securityfocus.com/archive/1/534161/100/0/threaded | BUGTRAQ | Third Party Advisory, VDB Entry |