Description
Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
Published: 2010-01-14
Score: 5.0 Medium
EPSS: 20.2% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1970-1 New openssl packages fix denial of service
Ubuntu USN Ubuntu USN USN-884-1 OpenSSL vulnerability
References
Link Providers
http://cvs.openssl.org/chngview?cn=19068 cve-icon cve-icon
http://cvs.openssl.org/chngview?cn=19069 cve-icon cve-icon
http://cvs.openssl.org/chngview?cn=19167 cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=127128920008563&w=2 cve-icon cve-icon
http://secunia.com/advisories/38175 cve-icon cve-icon
http://secunia.com/advisories/38181 cve-icon cve-icon
http://secunia.com/advisories/38200 cve-icon cve-icon
http://secunia.com/advisories/38761 cve-icon cve-icon
http://secunia.com/advisories/39461 cve-icon cve-icon
http://secunia.com/advisories/42724 cve-icon cve-icon
http://secunia.com/advisories/42733 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049 cve-icon cve-icon
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004 cve-icon cve-icon
http://www.debian.org/security/2010/dsa-1970 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:022 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2010/01/13/3 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-884-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/0124 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/0839 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/0916 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=546707 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-3157 cve-icon cve-icon
https://kb.bluecoat.com/index?page=content&id=SA50 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2009-4355 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11260 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12168 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6678 cve-icon cve-icon
https://rhn.redhat.com/errata/RHSA-2010-0095.html cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2009-4355 cve-icon
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.22931}

epss

{'score': 0.14534}


Subscriptions

Openssl Openssl
Redhat Enterprise Linux Openssl
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T07:01:19.955Z

Reserved: 2009-12-18T00:00:00.000Z

Link: CVE-2009-4355

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-01-14T19:30:00.390

Modified: 2026-04-23T00:35:47.467

Link: CVE-2009-4355

cve-icon Redhat

Severity : Moderate

Publid Date: 2010-01-13T00:00:00Z

Links: CVE-2009-4355 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses