{"id":"CVE-2008-1672","details":"OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses \"particular cipher suites,\" which triggers a NULL pointer dereference.","modified":"2026-02-05T03:52:57.479532Z","published":"2008-05-29T16:32:00Z","related":["SUSE-FU-2022:0445-1","openSUSE-SU-2024:11125-1","openSUSE-SU-2024:11126-1","openSUSE-SU-2024:11127-1"],"references":[{"type":"ADVISORY","url":"http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30405"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30460"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30825"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30852"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30868"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31228"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31288"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200806-08.xml"},{"type":"ADVISORY","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.562004"},{"type":"ADVISORY","url":"http://sourceforge.net/project/shownotes.php?release_id=615606"},{"type":"ADVISORY","url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738400"},{"type":"ADVISORY","url":"http://www.kb.cert.org/vuls/id/520586"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:107"},{"type":"ADVISORY","url":"http://www.openssl.org/news/secadv_20080528.txt"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/492932/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/29405"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id?1020122"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-620-1"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/1680"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/1937/references"},{"type":"ADVISORY","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/42667"},{"type":"ADVISORY","url":"https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01029.html"},{"type":"FIX","url":"http://www.securityfocus.com/bid/29405"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2008/1680"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2008/1937/references"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/520586"}],"schema_version":"1.7.3"}