{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2010-01-13T00:00:00.000Z","descriptions":[{"lang":"en","value":"Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-09-18T12:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"DSA-1970","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2010/dsa-1970"},{"name":"ADV-2010-0916","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2010/0916"},{"tags":["x_refsource_CONFIRM"],"url":"http://cvs.openssl.org/chngview?cn=19167"},{"name":"42724","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/42724"},{"name":"39461","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/39461"},{"name":"oval:org.mitre.oval:def:11260","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11260"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=546707"},{"name":"FEDORA-2010-5357","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"},{"name":"SSA:2010-060-02","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049"},{"name":"38761","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/38761"},{"tags":["x_refsource_CONFIRM"],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004"},{"name":"38181","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/38181"},{"name":"38200","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/38200"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.rpath.com/browse/RPL-3157"},{"name":"ADV-2010-0839","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2010/0839"},{"tags":["x_refsource_CONFIRM"],"url":"http://cvs.openssl.org/chngview?cn=19069"},{"name":"HPSBUX02517","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=127128920008563&w=2"},{"tags":["x_refsource_CONFIRM"],"url":"http://cvs.openssl.org/chngview?cn=19068"},{"name":"MDVSA-2010:022","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:022"},{"name":"RHSA-2010:0095","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://rhn.redhat.com/errata/RHSA-2010-0095.html"},{"name":"USN-884-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-884-1"},{"name":"SSRT100058","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=127128920008563&w=2"},{"name":"SUSE-SA:2010:008","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"},{"name":"[oss-security] 20100113 [PATCH] memory consumption (DoS) in openssl CVE-2009-4355","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2010/01/13/3"},{"tags":["x_refsource_CONFIRM"],"url":"https://kb.bluecoat.com/index?page=content&id=SA50"},{"name":"oval:org.mitre.oval:def:6678","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6678"},{"name":"42733","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/42733"},{"name":"ADV-2010-0124","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2010/0124"},{"name":"FEDORA-2010-5744","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"},{"name":"38175","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/38175"},{"name":"oval:org.mitre.oval:def:12168","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12168"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2009-4355","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"DSA-1970","refsource":"DEBIAN","url":"http://www.debian.org/security/2010/dsa-1970"},{"name":"ADV-2010-0916","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2010/0916"},{"name":"http://cvs.openssl.org/chngview?cn=19167","refsource":"CONFIRM","url":"http://cvs.openssl.org/chngview?cn=19167"},{"name":"42724","refsource":"SECUNIA","url":"http://secunia.com/advisories/42724"},{"name":"39461","refsource":"SECUNIA","url":"http://secunia.com/advisories/39461"},{"name":"oval:org.mitre.oval:def:11260","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11260"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=546707","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=546707"},{"name":"FEDORA-2010-5357","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"},{"name":"SSA:2010-060-02","refsource":"SLACKWARE","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049"},{"name":"38761","refsource":"SECUNIA","url":"http://secunia.com/advisories/38761"},{"name":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004","refsource":"CONFIRM","url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004"},{"name":"38181","refsource":"SECUNIA","url":"http://secunia.com/advisories/38181"},{"name":"38200","refsource":"SECUNIA","url":"http://secunia.com/advisories/38200"},{"name":"https://issues.rpath.com/browse/RPL-3157","refsource":"CONFIRM","url":"https://issues.rpath.com/browse/RPL-3157"},{"name":"ADV-2010-0839","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2010/0839"},{"name":"http://cvs.openssl.org/chngview?cn=19069","refsource":"CONFIRM","url":"http://cvs.openssl.org/chngview?cn=19069"},{"name":"HPSBUX02517","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=127128920008563&w=2"},{"name":"http://cvs.openssl.org/chngview?cn=19068","refsource":"CONFIRM","url":"http://cvs.openssl.org/chngview?cn=19068"},{"name":"MDVSA-2010:022","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:022"},{"name":"RHSA-2010:0095","refsource":"REDHAT","url":"https://rhn.redhat.com/errata/RHSA-2010-0095.html"},{"name":"USN-884-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-884-1"},{"name":"SSRT100058","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=127128920008563&w=2"},{"name":"SUSE-SA:2010:008","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"},{"name":"[oss-security] 20100113 [PATCH] memory consumption (DoS) in openssl CVE-2009-4355","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2010/01/13/3"},{"name":"https://kb.bluecoat.com/index?page=content&id=SA50","refsource":"CONFIRM","url":"https://kb.bluecoat.com/index?page=content&id=SA50"},{"name":"oval:org.mitre.oval:def:6678","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6678"},{"name":"42733","refsource":"SECUNIA","url":"http://secunia.com/advisories/42733"},{"name":"ADV-2010-0124","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2010/0124"},{"name":"FEDORA-2010-5744","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"},{"name":"38175","refsource":"SECUNIA","url":"http://secunia.com/advisories/38175"},{"name":"oval:org.mitre.oval:def:12168","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12168"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T07:01:19.955Z"},"title":"CVE Program Container","references":[{"name":"DSA-1970","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2010/dsa-1970"},{"name":"ADV-2010-0916","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2010/0916"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://cvs.openssl.org/chngview?cn=19167"},{"name":"42724","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/42724"},{"name":"39461","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/39461"},{"name":"oval:org.mitre.oval:def:11260","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11260"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=546707"},{"name":"FEDORA-2010-5357","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"},{"name":"SSA:2010-060-02","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049"},{"name":"38761","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/38761"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0004"},{"name":"38181","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/38181"},{"name":"38200","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/38200"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.rpath.com/browse/RPL-3157"},{"name":"ADV-2010-0839","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2010/0839"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://cvs.openssl.org/chngview?cn=19069"},{"name":"HPSBUX02517","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=127128920008563&w=2"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://cvs.openssl.org/chngview?cn=19068"},{"name":"MDVSA-2010:022","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:022"},{"name":"RHSA-2010:0095","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://rhn.redhat.com/errata/RHSA-2010-0095.html"},{"name":"USN-884-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-884-1"},{"name":"SSRT100058","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=127128920008563&w=2"},{"name":"SUSE-SA:2010:008","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"},{"name":"[oss-security] 20100113 [PATCH] memory consumption (DoS) in openssl CVE-2009-4355","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2010/01/13/3"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://kb.bluecoat.com/index?page=content&id=SA50"},{"name":"oval:org.mitre.oval:def:6678","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6678"},{"name":"42733","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/42733"},{"name":"ADV-2010-0124","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2010/0124"},{"name":"FEDORA-2010-5744","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"},{"name":"38175","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/38175"},{"name":"oval:org.mitre.oval:def:12168","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12168"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2009-4355","datePublished":"2010-01-14T19:00:00.000Z","dateReserved":"2009-12-18T00:00:00.000Z","dateUpdated":"2024-08-07T07:01:19.955Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}