mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
253 lines
10 KiB
JSON
253 lines
10 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2010-3864",
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "n/a",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded",
|
|
"refsource": "MISC",
|
|
"name": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
|
|
},
|
|
{
|
|
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
|
|
},
|
|
{
|
|
"url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
|
|
},
|
|
{
|
|
"url": "http://support.apple.com/kb/HT4723",
|
|
"refsource": "MISC",
|
|
"name": "http://support.apple.com/kb/HT4723"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/57353",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/57353"
|
|
},
|
|
{
|
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564",
|
|
"refsource": "MISC",
|
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/42309",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/42309"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/42413",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/42413"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/43312",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/43312"
|
|
},
|
|
{
|
|
"url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-10:10.openssl.asc",
|
|
"refsource": "MISC",
|
|
"name": "http://security.FreeBSD.org/advisories/FreeBSD-SA-10:10.openssl.asc"
|
|
},
|
|
{
|
|
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668793",
|
|
"refsource": "MISC",
|
|
"name": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668793"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2010/3077",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2010/3077"
|
|
},
|
|
{
|
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777",
|
|
"refsource": "MISC",
|
|
"name": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=130497251507577&w=2",
|
|
"refsource": "MISC",
|
|
"name": "http://marc.info/?l=bugtraq&m=130497251507577&w=2"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/44269",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/44269"
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/737740",
|
|
"refsource": "MISC",
|
|
"name": "http://www.kb.cert.org/vuls/id/737740"
|
|
},
|
|
{
|
|
"url": "http://blogs.sun.com/security/entry/cve_2010_3864_race_condition",
|
|
"refsource": "MISC",
|
|
"name": "http://blogs.sun.com/security/entry/cve_2010_3864_race_condition"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051170.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051170.html"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051237.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051237.html"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051255.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051255.html"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=129916880600544&w=2",
|
|
"refsource": "MISC",
|
|
"name": "http://marc.info/?l=bugtraq&m=129916880600544&w=2"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=132828103218869&w=2",
|
|
"refsource": "MISC",
|
|
"name": "http://marc.info/?l=bugtraq&m=132828103218869&w=2"
|
|
},
|
|
{
|
|
"url": "http://openssl.org/news/secadv_20101116.txt",
|
|
"refsource": "MISC",
|
|
"name": "http://openssl.org/news/secadv_20101116.txt"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/42241",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/42241"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/42243",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/42243"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/42336",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/42336"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/42352",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/42352"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/42397",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/42397"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1024743",
|
|
"refsource": "MISC",
|
|
"name": "http://securitytracker.com/id?1024743"
|
|
},
|
|
{
|
|
"url": "http://www.adobe.com/support/security/bulletins/apsb11-11.html",
|
|
"refsource": "MISC",
|
|
"name": "http://www.adobe.com/support/security/bulletins/apsb11-11.html"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2010/dsa-2125",
|
|
"refsource": "MISC",
|
|
"name": "http://www.debian.org/security/2010/dsa-2125"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2010/3041",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2010/3041"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2010/3097",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2010/3097"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2010/3121",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2010/3121"
|
|
},
|
|
{
|
|
"url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html",
|
|
"refsource": "MISC",
|
|
"name": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
|
|
},
|
|
{
|
|
"url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html",
|
|
"refsource": "MISC",
|
|
"name": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
|
|
},
|
|
{
|
|
"url": "https://rhn.redhat.com/errata/RHSA-2010-0888.html",
|
|
"refsource": "MISC",
|
|
"name": "https://rhn.redhat.com/errata/RHSA-2010-0888.html"
|
|
},
|
|
{
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=649304",
|
|
"refsource": "MISC",
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=649304"
|
|
}
|
|
]
|
|
}
|
|
} |