CVE-2006-4343 - NULL Pointer Dereference

Severity

43%

Complexity

86%

Confidentiality

48%

This vulnerability is addressed in the following product releases: OpenSSL Project, OpenSSL, 0.9.7l (or later) OpenSSL Project, OpenSSL, 0.9.8d (or later)

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.

This vulnerability is addressed in the following product releases: OpenSSL Project, OpenSSL, 0.9.7l (or later) OpenSSL Project, OpenSSL, 0.9.8d (or later)

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P).

Demo Examples

NULL Pointer Dereference

CWE-476

While there are no complete fixes aside from conscientious programming, the following steps will go a long way to ensure that NULL pointer dereferences do not occur.


               
}
/* make use of pointer1 *//* ... */

If you are working with a multithreaded or otherwise asynchronous environment, ensure that proper locking APIs are used to lock before the if statement; and unlock when it has finished.

NULL Pointer Dereference

CWE-476

This example takes an IP address from a user, verifies that it is well formed and then looks up the hostname and copies it into a buffer.


               
}
strcpy(hostname, hp->h_name);/*routine that ensures user_supplied_addr is in the right format for conversion */

If an attacker provides an address that appears to be well-formed, but the address does not resolve to a hostname, then the call to gethostbyaddr() will return NULL. Since the code does not check the return value from gethostbyaddr (CWE-252), a NULL pointer dereference would then occur in the call to strcpy().

Note that this example is also vulnerable to a buffer overflow (see CWE-119).

NULL Pointer Dereference

CWE-476

In the following code, the programmer assumes that the system always has a property named "cmd" defined. If an attacker can control the program's environment so that "cmd" is not defined, the program throws a NULL pointer exception when it attempts to call the trim() method.


               
cmd = cmd.trim();

NULL Pointer Dereference

CWE-476

This application has registered to handle a URL when sent an intent:


               
}......
}
}
int length = URL.length();
...

The application assumes the URL will always be included in the intent. When the URL is not present, the call to getStringExtra() will return null, thus causing a null pointer exception when length() is called.

Overview

First reported 18 years ago

2006-09-28 18:07:00

Last updated 6 years ago

2018-10-17 21:36:00

Affected Software

OpenSSL Project OpenSSL 0.9.7

0.9.7

OpenSSL Project OpenSSL 0.9.7a

0.9.7a

OpenSSL Project OpenSSL 0.9.7b

0.9.7b

OpenSSL Project OpenSSL 0.9.7c

0.9.7c

OpenSSL Project OpenSSL 0.9.7d

0.9.7d

OpenSSL Project OpenSSL 0.9.7e

0.9.7e

OpenSSL Project OpenSSL 0.9.7f

0.9.7f

OpenSSL Project OpenSSL 0.9.7g

0.9.7g

OpenSSL Project OpenSSL 0.9.7h

0.9.7h

OpenSSL Project OpenSSL 0.9.7i

0.9.7i

OpenSSL Project OpenSSL 0.9.7j

0.9.7j

OpenSSL Project OpenSSL 0.9.7k

0.9.7k

OpenSSL Project OpenSSL 0.9.8

0.9.8

OpenSSL Project OpenSSL 0.9.8a

0.9.8a

OpenSSL Project OpenSSL 0.9.8b

0.9.8b

OpenSSL Project OpenSSL 0.9.8c

0.9.8c

Debian Debian Linux 3.1

3.1

Canonical Ubuntu Linux 5.04

5.04

Canonical Ubuntu Linux 5.10

5.10

Canonical Ubuntu Linux 6.06 LTS (Long-Term Support)

6.06

References

NetBSD-SA2008-007

Third Party Advisory

20061001-01-P

Third Party Advisory

http://docs.info.apple.com/article.html?artnum=304829

Third Party Advisory

HPSBMA02250

Broken Link

http://issues.rpath.com/browse/RPL-613

Broken Link

HPSBUX02174

Broken Link

SSRT071299

Broken Link

http://kolab.org/security/kolab-vendor-notice-11.txt

Broken Link

APPLE-SA-2006-11-28

Mailing List, Third Party Advisory

20060928 [SECURITY] OpenSSL 0.9.8d and 0.9.7l released

Mailing List, Third Party Advisory

[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues

Mailing List, Third Party Advisory

SSRT090208

Mailing List, Third Party Advisory

[3.9] 20061007 013: SECURITY FIX: October 7, 2006

Third Party Advisory

http://openvpn.net/changelog.html

Third Party Advisory

22094

Third Party Advisory

22116

Third Party Advisory

22130

Third Party Advisory

22165

Third Party Advisory

22166

Third Party Advisory

22172

Third Party Advisory

22186

Third Party Advisory

22193

Third Party Advisory

22207

Third Party Advisory

22212

Third Party Advisory

22216

Third Party Advisory

22220

Third Party Advisory

22240

Third Party Advisory

22259

Third Party Advisory

22260

Third Party Advisory

22284

Third Party Advisory

22298

Third Party Advisory

22330

Third Party Advisory

22385

Third Party Advisory

22460

Third Party Advisory

22487

Third Party Advisory

22500

Third Party Advisory

22544

Third Party Advisory

22626

Third Party Advisory

22758

Third Party Advisory

22772

Third Party Advisory

22791

Third Party Advisory

22799

Third Party Advisory

23038

Third Party Advisory

23155

Third Party Advisory

23280

Third Party Advisory

23309

Third Party Advisory

23340

Third Party Advisory

23680

Third Party Advisory

23794

Third Party Advisory

23915

Third Party Advisory

24950

Third Party Advisory

25420

Third Party Advisory

25889

Third Party Advisory

26329

Third Party Advisory

30124

Third Party Advisory

31492

Third Party Advisory

FreeBSD-SA-06:23.openssl

Third Party Advisory

GLSA-200610-11

Third Party Advisory

1016943

Third Party Advisory, VDB Entry

1017522

Third Party Advisory, VDB Entry

SSA:2006-272-01

Mailing List, Third Party Advisory

http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227

Broken Link

102668

Broken Link

102711

Broken Link

201531

Broken Link

http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm

Third Party Advisory

http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm

Third Party Advisory

20061108 Multiple Vulnerabilities in OpenSSL Library

Third Party Advisory

20061108 Multiple Vulnerabilities in OpenSSL library

Third Party Advisory

DSA-1185

Third Party Advisory

DSA-1195

Third Party Advisory

GLSA-200612-11

Third Party Advisory

http://www.ingate.com/relnote-452.php

Broken Link

VU#386964

Patch, Third Party Advisory, US Government Resource

MDKSA-2006:172

Third Party Advisory

MDKSA-2006:177

Third Party Advisory

MDKSA-2006:178

Broken Link

SUSE-SR:2006:024

Broken Link

SUSE-SA:2006:058

Broken Link

OpenPKG-SA-2006.021

Third Party Advisory

http://www.openssl.org/news/secadv_20060928.txt

Patch, Third Party Advisory

http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html

Third Party Advisory

29263

Broken Link

RHSA-2006:0695

Third Party Advisory

RHSA-2008:0629

Third Party Advisory

20060928 rPSA-2006-0175-1 openssl openssl-scripts

20060929 rPSA-2006-0175-2 openssl openssl-scripts

20070110 VMware ESX server security updates

20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues

20246

Patch, Third Party Advisory, VDB Entry

22083

Third Party Advisory, VDB Entry

28276

Third Party Advisory, VDB Entry

http://www.serv-u.com/releasenotes/

Third Party Advisory

2006-0054

Broken Link

USN-353-1

Third Party Advisory

TA06-333A

Third Party Advisory, US Government Resource

http://www.vmware.com/security/advisories/VMSA-2008-0005.html

Third Party Advisory

http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html

Third Party Advisory

http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html

Third Party Advisory

http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html

Third Party Advisory

http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html

Third Party Advisory

http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html

Third Party Advisory

http://www.vmware.com/support/player/doc/releasenotes_player.html

Third Party Advisory

http://www.vmware.com/support/player2/doc/releasenotes_player2.html

Third Party Advisory

http://www.vmware.com/support/server/doc/releasenotes_server.html

Third Party Advisory

http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html

Third Party Advisory

http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html

Third Party Advisory

http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html

Third Party Advisory

http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html

Third Party Advisory

ADV-2006-3820

Permissions Required, Third Party Advisory

ADV-2006-3860

Permissions Required, Third Party Advisory

ADV-2006-3869

Permissions Required, Third Party Advisory

ADV-2006-3902

Permissions Required, Third Party Advisory

ADV-2006-3936

Permissions Required, Third Party Advisory

ADV-2006-4036

Permissions Required, Third Party Advisory

ADV-2006-4264

Permissions Required, Third Party Advisory

ADV-2006-4401

Permissions Required, Third Party Advisory

ADV-2006-4417

Permissions Required, Third Party Advisory

ADV-2006-4443

Permissions Required, Third Party Advisory

ADV-2006-4750

Permissions Required, Third Party Advisory

ADV-2007-0343

Permissions Required, Third Party Advisory

ADV-2007-1401

Permissions Required, Third Party Advisory

ADV-2007-1973

Permissions Required, Third Party Advisory

ADV-2007-2783

Permissions Required, Third Party Advisory

ADV-2008-0905

Permissions Required, Third Party Advisory

http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf

Third Party Advisory

openssl-sslv2-client-dos(29240)

Third Party Advisory, VDB Entry

oval:org.mitre.oval:def:10207

Third Party Advisory

oval:org.mitre.oval:def:4356

Third Party Advisory

4773

Third Party Advisory, VDB Entry

SSRT071304

Broken Link

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.