CVE-2009-1379

NameCVE-2009-1379
DescriptionUse-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs530400

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssl (PTS)jessie1.0.1t-1+deb8u8fixed
jessie (security)1.0.1t-1+deb8u12fixed
stretch1.1.0k-1~deb9u1fixed
stretch (security)1.1.0l-1~deb9u1fixed
buster, buster (security)1.1.1d-0+deb10u2fixed
bullseye, sid1.1.1d-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensslsource(unstable)0.9.8k-1low530400
opensslsourceetch0.9.8c-4etch9
opensslsourcelenny0.9.8g-15+lenny3
openssl097source(unstable)(not affected)

Notes

- openssl097 <not-affected> (DTLS support was introduced in 0.9.8)

Search for package or bug name: Reporting problems