CVE-2010-3864
17.11.2010, 16:00
Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
Vendor | Product | Version |
---|---|---|
openssl | openssl | 0.9.8f:f |
openssl | openssl | 0.9.8g:g |
openssl | openssl | 0.9.8h:h |
openssl | openssl | 0.9.8i:i |
openssl | openssl | 0.9.8j:j |
openssl | openssl | 0.9.8k:k |
openssl | openssl | 0.9.8l:l |
openssl | openssl | 0.9.8m:m |
openssl | openssl | 0.9.8n:n |
openssl | openssl | 0.9.8o:o |
openssl | openssl | 1.0.0 |
openssl | openssl | 1.0.0a:a |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References