CVE-2010-2939

Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime.  NOTE: some sources refer to this as a use-after-free issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
VendorProductVersion
opensslopenssl
0.9.7
opensslopenssl
0.9.8
opensslopenssl
1.0.0a:a
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
lucid
Fixed 0.9.8k-7ubuntu8.3
released
karmic
Fixed 0.9.8g-16ubuntu3.3
released
jaunty
Fixed 0.9.8g-15ubuntu3.6
released
hardy
Fixed 0.9.8g-4ubuntu3.11
released
dapper
Fixed 0.9.8a-7ubuntu0.13
released
openssl097
lucid
dne
karmic
dne
jaunty
dne
hardy
dne
dapper
ignored
Common Weakness Enumeration
References