CVE-2009-1379

N/A Unknown
Published: May 19, 2009 Modified: April 23, 2026
View on NVD

Description

Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/35416
Source: secalert@redhat.com
http://secunia.com/advisories/35461
Source: secalert@redhat.com
http://secunia.com/advisories/35571
Source: secalert@redhat.com
http://secunia.com/advisories/35729
Source: secalert@redhat.com
http://secunia.com/advisories/36533
Source: secalert@redhat.com
http://secunia.com/advisories/37003
Source: secalert@redhat.com
http://secunia.com/advisories/38761
Source: secalert@redhat.com
http://secunia.com/advisories/38794
Source: secalert@redhat.com
http://secunia.com/advisories/38834
Source: secalert@redhat.com
http://secunia.com/advisories/42724
Source: secalert@redhat.com
http://secunia.com/advisories/42733
Source: secalert@redhat.com
http://www.securityfocus.com/bid/35138
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-792-1
Source: secalert@redhat.com
https://launchpad.net/bugs/cve/2009-1379
Source: secalert@redhat.com
http://rt.openssl.org/Ticket/Display.html?id=1923&user=guest&pass=guest
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/35416
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35461
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35571
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35729
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/36533
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37003
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38761
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38794
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38834
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/42724
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/42733
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200912-01.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://voodoo-circle.sourceforge.net/sa/sa-20091012-01.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2009/05/18/4
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-1335.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/35138
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1022241
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-792-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/1377
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/0528
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/50661
Source: af854a3a-2127-422b-91ae-364da2661108
https://kb.bluecoat.com/index?page=content&id=SA50
Source: af854a3a-2127-422b-91ae-364da2661108
https://launchpad.net/bugs/cve/2009-1379
Source: af854a3a-2127-422b-91ae-364da2661108

64 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
8.6%
92th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

openssl