Executive Summary
Summary | |
---|---|
Title | Sun Alert 246846 A Security Vulnerability in the OpenSSL PKCS#11 Engine May Result in Denial of Service (DoS) Due to a Corrupted Session Cache |
Informations | |||
---|---|---|---|
Name | SUN-246846 | First vendor Publication | 2008-12-03 |
Vendor | Sun | Last vendor Modification | 2008-12-03 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Product: Solaris 10 Operating System A security vulnerability in the OpenSSL PKCS#11 engine as shipped with Solaris 10 may affect applications which make use of this engine. The exact impact will vary depending on the application. This vulnerabiltiy may allow a local or remote unprivileged user to cause certain cryptographic operations within the application to fail (namely RSA_sign and RSA_verify), which is a type of Denial of Service (DoS). For example, if the OpenSSL PKCS#11 engine is used for SSL processing (for example, in the Apache webserver) it will result in SSL connections being dropped in the SSL handshake phase, thereby causing a Denial Of Service (DoS) due to a corrupted session cache. State: Resolved First released: 03-Dec-2008 |
Original Source
Url : http://blogs.sun.com/security/entry/sun_alert_246846_a_security |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-310 | Cryptographic Issues |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:5914 | |||
Oval ID: | oval:org.mitre.oval:def:5914 | ||
Title: | A Security Vulnerability in the OpenSSL PKCS#11 Engine May Result in Denial of Service (DoS) Due to a Corrupted Session Cache | ||
Description: | The PK11_SESSION cache in the OpenSSL PKCS#11 engine in Sun Solaris 10 does not maintain reference counts for operations with asymmetric keys, which allows context-dependent attackers to cause a denial of service (failed cryptographic operations) via unspecified vectors, related to the (1) RSA_sign and (2) RSA_verify functions. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-5410 | Version: | 1 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 2 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
50614 | Solaris OpenSSL PKCS#11 Corrupted Session Cache DoS |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2008-12-11 | IAVM : 2008-T-0066 - Sun Solaris Denial of Service Vulnerability Severity : Category I - VMSKEY : V0017916 |
Alert History
Date | Informations |
---|---|
2013-02-06 19:08:22 |
|