SSL: OpenSSL TLS Connection Record Handling Denial of Service
This signature detects attempts to exploit a known vulnerability in OpenSSL. It is due to an error in the ssl3_get_record() function when handling TLS connections. A remote attacker can exploit this by crafting certain records in TLS packets. A successful attack can result in the termination of the affected service due to a read attempt at NULL, which leads to a denial-of-service condition.
Extended Description
OpenSSL is prone to a denial-of-service vulnerability caused by a NULL-pointer dereference. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL versions 0.9.8f through 0.9.8m are vulnerable.
Affected Products
Intel active_management_technology_sdk,Pardus linux_2009
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Blue_coat_systems
Intel
F5
Sun
Ibm
Voodoo_circle
Pardus
Mandriva
Openssl_project
Vmware
Apple
5.0