Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
References
Link Providers
http://blogs.sun.com/security/entry/cve_2010_3864_race_condition cve-icon cve-icon
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051170.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051237.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051255.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=129916880600544&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=130497251507577&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=132828103218869&w=2 cve-icon cve-icon
http://openssl.org/news/secadv_20101116.txt cve-icon cve-icon
http://secunia.com/advisories/42241 cve-icon cve-icon
http://secunia.com/advisories/42243 cve-icon cve-icon
http://secunia.com/advisories/42309 cve-icon cve-icon
http://secunia.com/advisories/42336 cve-icon cve-icon
http://secunia.com/advisories/42352 cve-icon cve-icon
http://secunia.com/advisories/42397 cve-icon cve-icon
http://secunia.com/advisories/42413 cve-icon cve-icon
http://secunia.com/advisories/43312 cve-icon cve-icon
http://secunia.com/advisories/44269 cve-icon cve-icon
http://secunia.com/advisories/57353 cve-icon cve-icon
http://security.FreeBSD.org/advisories/FreeBSD-SA-10:10.openssl.asc cve-icon cve-icon
http://securitytracker.com/id?1024743 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668793 cve-icon cve-icon
http://support.apple.com/kb/HT4723 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 cve-icon cve-icon
http://www.adobe.com/support/security/bulletins/apsb11-11.html cve-icon cve-icon
http://www.debian.org/security/2010/dsa-2125 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/737740 cve-icon cve-icon
http://www.securityfocus.com/archive/1/516397/100/0/threaded cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2011-0003.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/3041 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/3077 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/3097 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/3121 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=649304 cve-icon cve-icon
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html cve-icon cve-icon
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2010-3864 cve-icon
https://rhn.redhat.com/errata/RHSA-2010-0888.html cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2010-3864 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2010-11-17T15:00:00

Updated: 2024-08-07T03:26:11.631Z

Reserved: 2010-10-08T00:00:00

Link: CVE-2010-3864

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-11-17T16:00:01.763

Modified: 2024-11-21T01:19:46.920

Link: CVE-2010-3864

cve-icon Redhat

Severity : Important

Publid Date: 2010-11-16T00:00:00Z

Links: CVE-2010-3864 - Bugzilla