Description
The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
Published: 2012-01-06
Score: 5.0 Medium
EPSS: 3.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2390-1 openssl security update
Debian DSA Debian DSA DSA-2454-1 openssl security update
EUVD EUVD EUVD-2011-4542 The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
Ubuntu USN Ubuntu USN USN-1357-1 OpenSSL vulnerabilities
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.03794}

epss

{'score': 0.04891}


Subscriptions

Openssl Openssl
Redhat Enterprise Linux Jboss Enterprise Application Platform Jboss Enterprise Web Server
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T00:09:19.394Z

Reserved: 2011-11-29T00:00:00.000Z

Link: CVE-2011-4619

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-01-06T01:55:01.003

Modified: 2025-04-11T00:51:21.963

Link: CVE-2011-4619

cve-icon Redhat

Severity : Moderate

Publid Date: 2012-01-04T00:00:00Z

Links: CVE-2011-4619 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses