SSL: OpenSSL ssl3_get_key_exchange Use-After-Free Memory Corruption

This signature detects attempts to exploit a known flaw in the OpenSSL library. The vulnerability is due to an error in ssl3_get_key_exchange function while handling server key exchange message. If a certificate structure contains a crafted value, the vulnerable code could cause a double-free error. Remote attackers could exploit this vulnerability by enticing the target user to connect to a malicious server using a vulnerable version of the OpenSSL library. Successful exploitation may allow for arbitrary code execution with the privileges of the application using the OpenSSL library.

Extended Description

OpenSSL is prone to a remote memory-corruption vulnerability. Successfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the application using the vulnerable library. Failed exploit attempts will result in a denial-of-service condition. The issue affects OpenSSL 1.0.0a; other versions may also be affected.

Affected Products

Pardus linux_2009

References

BugTraq: 42306

CVE: CVE-2010-2939

Short Name
SSL:OPENSSL-GET-KEY-EXCH-UAF
Severity
Major
Recommended
False
Recommended Action
None
Category
SSL
Keywords
CVE-2010-2939 Corruption Memory OpenSSL Use-After-Free bid:42306 ssl3_get_key_exchange
Release Date
11/15/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Suse

Freebsd

Hp

Pardus

Slackware

Ubuntu

Mandriva

Netbsd

Debian

Vmware

CVSS Score

4.3

Found a potential security threat?