Overview
A vulnerability exists in OpenSSL that may allow a remote attacker to cause a denial of service.
Description
OpenSSL contains a vulnerability in the way server name extension data is handled that may result in a denial of service. According to OpenSSL Security Advisory [28-Mar-2008]: If OpenSSL has been compiled using the non-default TLS server name extensions, a remote attacker could send a carefully crafted packet to a server application using OpenSSL and cause it to crash.  | 
Impact
A remote, unauthorized attacker may be able to cause a denial of service.  | 
Solution
Upgrade or Apply Patch  | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | 0 | AV:--/AC:--/Au:--/C:--/I:--/A:-- | 
| Temporal | 0 | E:ND/RL:ND/RC:ND | 
| Environmental | 0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND | 
References
Acknowledgements
This issue was reported in OpenSSL Security Advisory [28-Mar-2008]. OpenSSL credits Codenomicon for reporting these issues.
This document was written by Chris Taschner.
Other Information
| CVE IDs: | CVE-2008-0891 | 
| Severity Metric: | 14.88 | 
| Date Public: | 2008-05-28 | 
| Date First Published: | 2008-05-30 | 
| Date Last Updated: | 2008-05-30 15:35 UTC | 
| Document Revision: | 9 |