Lucene search

K
f5F5F5:K15328
HistoryJun 20, 2014 - 12:00 a.m.

K15328 : OpenSSL vulnerability CVE-2010-5298

2014-06-2000:00:00
my.f5.com
33

7.4 High

AI Score

Confidence

High

0.029 Low

EPSS

Percentile

90.8%

Security Advisory Description

Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment. (CVE-2010-5298)
Impact
This vulnerability may allow remote attackers to inject data across sessions or cause a denial-of-service (use-after-free and parsing error) attack through a Secure Sockets Layer (SSL) connection in a multi-threaded environment.