CVE-2009-1387 (NVD)

2009-06-04

The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."

Products Ubuntu_linux, Openssl, Openssl
Type NULL Pointer Dereference (CWE-476)
First patch - None (likely due to unavailable code)
Links http://sourceforge.net/mailarchive/message.php?msg_name=4AD43807.7080105%40users.sourceforge.net
http://security.gentoo.org/glsa/glsa-200912-01.xml
http://secunia.com/advisories/38834
http://secunia.com/advisories/36533
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10740