Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2010-3864

Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.074
EPSS Ranking 91.3%
CVSS Severity
CVSS v2 Score 7.6
References
Products affected by CVE-2010-3864
  • Openssl » Openssl » Version: 0.9.8f
    cpe:2.3:a:openssl:openssl:0.9.8f
  • Openssl » Openssl » Version: 0.9.8g
    cpe:2.3:a:openssl:openssl:0.9.8g
  • Openssl » Openssl » Version: 0.9.8h
    cpe:2.3:a:openssl:openssl:0.9.8h
  • Openssl » Openssl » Version: 0.9.8i
    cpe:2.3:a:openssl:openssl:0.9.8i
  • Openssl » Openssl » Version: 0.9.8j
    cpe:2.3:a:openssl:openssl:0.9.8j
  • Openssl » Openssl » Version: 0.9.8k
    cpe:2.3:a:openssl:openssl:0.9.8k
  • Openssl » Openssl » Version: 0.9.8l
    cpe:2.3:a:openssl:openssl:0.9.8l
  • Openssl » Openssl » Version: 0.9.8m
    cpe:2.3:a:openssl:openssl:0.9.8m
  • Openssl » Openssl » Version: 0.9.8n
    cpe:2.3:a:openssl:openssl:0.9.8n
  • Openssl » Openssl » Version: 0.9.8o
    cpe:2.3:a:openssl:openssl:0.9.8o
  • Openssl » Openssl » Version: 1.0.0
    cpe:2.3:a:openssl:openssl:1.0.0
  • Openssl » Openssl » Version: 1.0.0a
    cpe:2.3:a:openssl:openssl:1.0.0a


Contact Us

Shodan ® - All rights reserved