CVE-2009-4355

Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
VendorProductVersion
opensslopenssl
𝑥
≤ 0.9.8l
opensslopenssl
0.9.1c:c
opensslopenssl
0.9.2b:b
opensslopenssl
0.9.3
opensslopenssl
0.9.3a:a
opensslopenssl
0.9.4
opensslopenssl
0.9.5
opensslopenssl
0.9.5:beta1
opensslopenssl
0.9.5:beta2
opensslopenssl
0.9.5a:a
opensslopenssl
0.9.5a:a
opensslopenssl
0.9.5a:a
opensslopenssl
0.9.6
opensslopenssl
0.9.6:beta1
opensslopenssl
0.9.6:beta2
opensslopenssl
0.9.6:beta3
opensslopenssl
0.9.6a:a
opensslopenssl
0.9.6a:a
opensslopenssl
0.9.6a:a
opensslopenssl
0.9.6a:a
opensslopenssl
0.9.6b:b
opensslopenssl
0.9.6c:c
opensslopenssl
0.9.6d:d
opensslopenssl
0.9.6e:e
opensslopenssl
0.9.6f:f
opensslopenssl
0.9.6g:g
opensslopenssl
0.9.6h:h
opensslopenssl
0.9.6i:i
opensslopenssl
0.9.6j:j
opensslopenssl
0.9.6k:k
opensslopenssl
0.9.6l:l
opensslopenssl
0.9.6m:m
opensslopenssl
0.9.7
opensslopenssl
0.9.7:beta1
opensslopenssl
0.9.7:beta2
opensslopenssl
0.9.7:beta3
opensslopenssl
0.9.7:beta4
opensslopenssl
0.9.7:beta5
opensslopenssl
0.9.7:beta6
opensslopenssl
0.9.7a:a
opensslopenssl
0.9.7b:b
opensslopenssl
0.9.7c:c
opensslopenssl
0.9.7d:d
opensslopenssl
0.9.7e:e
opensslopenssl
0.9.7f:f
opensslopenssl
0.9.7g:g
opensslopenssl
0.9.7h:h
opensslopenssl
0.9.7i:i
opensslopenssl
0.9.7j:j
opensslopenssl
0.9.7k:k
opensslopenssl
0.9.7l:l
opensslopenssl
0.9.7m:m
opensslopenssl
0.9.8
opensslopenssl
0.9.8a:a
opensslopenssl
0.9.8b:b
opensslopenssl
0.9.8c:c
opensslopenssl
0.9.8d:d
opensslopenssl
0.9.8e:e
opensslopenssl
0.9.8f:f
opensslopenssl
0.9.8g:g
opensslopenssl
0.9.8h:h
opensslopenssl
0.9.8i:i
opensslopenssl
0.9.8j:j
opensslopenssl
0.9.8k:k
redhatopenssl
0.9.6-15
redhatopenssl
0.9.6b-3:b
redhatopenssl
0.9.7a-2:a
opensslopenssl
1.0.0:beta1
opensslopenssl
1.0.0:beta2
opensslopenssl
1.0.0:beta3
opensslopenssl
1.0.0:beta4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
etch
not-affected
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
karmic
Fixed 0.9.8g-16ubuntu3.1
released
jaunty
Fixed 0.9.8g-15ubuntu3.4
released
intrepid
Fixed 0.9.8g-10.1ubuntu2.6
released
hardy
Fixed 0.9.8g-4ubuntu3.9
released
dapper
Fixed 0.9.8a-7ubuntu0.11
released
Common Weakness Enumeration
References