Description
The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1888-1 | New openssl packages deprecate MD2 hash signatures |
Ubuntu USN |
USN-792-1 | OpenSSL vulnerabilities |
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T05:13:25.436Z
Reserved: 2009-04-23T00:00:00.000Z
Link: CVE-2009-1387
No data.
Status : Modified
Published: 2009-06-04T16:30:00.343
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-1387
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN