CVE-2006-4343

Summary

CVECVE-2006-4343
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2006-09-28 18:07:00 UTC
Updated2018-10-17 21:36:00 UTC
DescriptionThe get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.

Risk And Classification

Problem Types: CWE-476

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Canonical Ubuntu Linux 5.04 All All All
Operating System Canonical Ubuntu Linux 5.10 All All All
Operating System Canonical Ubuntu Linux 6.06 All All All
Operating System Canonical Ubuntu Linux 5.04 All All All
Operating System Canonical Ubuntu Linux 5.10 All All All
Operating System Canonical Ubuntu Linux 6.06 All All All
Operating System Debian Debian Linux 3.1 All All All
Operating System Debian Debian Linux 3.1 All All All
Application Openssl Openssl 0.9.7 All All All
Application Openssl Openssl 0.9.7a All All All
Application Openssl Openssl 0.9.7b All All All
Application Openssl Openssl 0.9.7c All All All
Application Openssl Openssl 0.9.7d All All All
Application Openssl Openssl 0.9.7e All All All
Application Openssl Openssl 0.9.7f All All All
Application Openssl Openssl 0.9.7g All All All
Application Openssl Openssl 0.9.7h All All All
Application Openssl Openssl 0.9.7i All All All
Application Openssl Openssl 0.9.7j All All All
Application Openssl Openssl 0.9.7k All All All
Application Openssl Openssl 0.9.8 All All All
Application Openssl Openssl 0.9.8a All All All
Application Openssl Openssl 0.9.8b All All All
Application Openssl Openssl 0.9.8c All All All
Application Openssl Openssl 0.9.7 All All All
Application Openssl Openssl 0.9.7a All All All
Application Openssl Openssl 0.9.7b All All All
Application Openssl Openssl 0.9.7c All All All
Application Openssl Openssl 0.9.7d All All All
Application Openssl Openssl 0.9.7e All All All
Application Openssl Openssl 0.9.7f All All All
Application Openssl Openssl 0.9.7g All All All
Application Openssl Openssl 0.9.7h All All All
Application Openssl Openssl 0.9.7i All All All
Application Openssl Openssl 0.9.7j All All All
Application Openssl Openssl 0.9.7k All All All
Application Openssl Openssl 0.9.8 All All All
Application Openssl Openssl 0.9.8a All All All
Application Openssl Openssl 0.9.8b All All All
Application Openssl Openssl 0.9.8c All All All

References

ReferenceSourceLinkTags
Kolab Server Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
29263 OSVDB www.osvdb.org Broken Link
US-CERT Vulnerability Note VU#386964 CERT-VN www.kb.cert.org Patch, Third Party Advisory, US Government Resource
Ingate Firewall and SIParator Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
SnapGear Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Mac OS X Security Update Fixes Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Cisco Products OpenSSL Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
HP System Management Homepage Apache and OpenSSL Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
OpenSSL < 0.9.7l / 0.9.8d SSLv2 Client Crash Exploit EXPLOIT-DB www.exploit-db.com Third Party Advisory, VDB Entry
FreeBSD update for openssl - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Red Hat update for openssl - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
VMware Workstation 6 Release Notes CONFIRM www.vmware.com Third Party Advisory
OpenSSL Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
The Slackware Linux Project: Slackware Security Advisories SLACKWARE slackware.com Mailing List, Third Party Advisory
Debian update for openssl096 - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
2006-0054 TRUSTIX www.trustix.org Broken Link
VMware ESX Server 2.5.3 Upgrade Patch 6 (for 2.5.3 Systems) CONFIRM www.vmware.com Third Party Advisory
SGI Advanced Linux Environment Multiple Updates - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Xerox ESS/ Network Controller OpenSSL Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
US-CERT Technical Cyber Security Alert TA06-333A -- Apple Releases Security Update to Address Multiple Vulnerabilities CERT www.us-cert.gov Third Party Advisory, US Government Resource
VMware Player Release Notes CONFIRM www.vmware.com Third Party Advisory
SUSE updates for openssh, openssl, and bind9 - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
SecurityTracker.com Archives - OpenSSL ASN.1 Bugs, SSL_get_shared_ciphers() Buffer Overflow, and SSLv2 Client Error Lets Remote Users Denial of Service or Execute Arbitrary Code SECTRACK securitytracker.com Third Party Advisory, VDB Entry
Support REDHAT www.redhat.com Third Party Advisory
Serv-U FTP Server OpenSSL Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
FreeBSD-SA-06:23.openssl FREEBSD security.freebsd.org Third Party Advisory
VMware ESX Server 2.1.3 Upgrade Patch 4 (for 2.1.3 Systems) CONFIRM www.vmware.com Third Party Advisory
SourceForge.net: SysAdmin Tools from ITeF!x: Files CONFIRM sourceforge.net Broken Link
IBM X-Force Exchange XF exchange.xforce.ibmcloud.com Third Party Advisory, VDB Entry
rhn.redhat.com | Red Hat Support REDHAT www.redhat.com Third Party Advisory
Oracle Products Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Debian -- Security Information -- DSA-1185-2 openssl DEBIAN www.debian.org Third Party Advisory
Webmail - OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
VMSA-2008-0005.1 - VMware CONFIRM www.vmware.com Third Party Advisory
Release notice for Ingate Firewall® 4.5.2 and Ingate SIParator® 4.5.2 CONFIRM www.ingate.com Broken Link
Download Patch ESX-9986131 for VMware ESX Server 3.0.1 CONFIRM www.vmware.com Third Party Advisory
VMWare ESX Server Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
VMware Server Release Notes CONFIRM www.vmware.com Third Party Advisory
NetBSD update for OpenSSL - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Sun Grid Engine Multiple OpenSSL Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Webmail - OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
[Security-announce] VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues MLIST lists.vmware.com Mailing List, Third Party Advisory
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
Serv-U Release Notes - Current CONFIRM www.serv-u.com Third Party Advisory
SUSE update for openssl - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Security Announcement SUSE www.novell.com Broken Link
Cisco - Networking, Cloud, and Cybersecurity Solutions CISCO www.cisco.com Third Party Advisory
SecurityFocus BUGTRAQ www.securityfocus.com
APPLE-SA-2006-11-28 Security Update 2006-007 APPLE lists.apple.com Mailing List, Third Party Advisory
SecurityFocus BUGTRAQ www.securityfocus.com
Repository / Oval Repository OVAL oval.cisecurity.org Third Party Advisory
OpenBSD update for OpenSSL - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Webmail - OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
Oracle Critical Patch Update - January 2007 CONFIRM www.oracle.com Third Party Advisory
VMware ESX Server 2.5.4 Upgrade Patch 3 (for 2.5.4 Systems Only) CONFIRM www.vmware.com Third Party Advisory
Webmail - OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
Mandriva update for openssl - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
#102668: Security Vulnerabilities In OpenSSL Affect Sun Grid Engine 5.3 and N1 Grid Engine 6.0 SUNALERT sunsolve.sun.com Broken Link
SecurityTracker.com Archives - Oracle Database and Other Products Have 52 Unspecified Vulnerabilities With Unspecified Impact SECTRACK securitytracker.com Third Party Advisory, VDB Entry
rPath update for openssl - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
'[security bulletin] HPSBOV02683 SSRT090208 rev.1 - HP Secure Web Server (SWS) for OpenVMS running Ap' - MARC HP marc.info Mailing List, Third Party Advisory
IT Resource Center - login / register HP itrc.hp.com Broken Link
Advisories - Mandriva Linux MANDRIVA www.mandriva.com Third Party Advisory
20061001-01-P SGI patches.sgi.com Third Party Advisory
HPSBMA02250 SSRT061275 rev.1 - HP System Management Homepage (SMH) for Linux and Windows, Remote Execution of Arbitrary Code and Denial of Service (DoS) - c01118771 - HP Business Support Center HP h20000.www2.hp.com Broken Link
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
[#RPL-613] openssl vulnerabilities including remote unauthorized access: CVE-2006-2937 CVE-2006-2940 CVE-2006-3738 CVE-2006-4343 - rPath JIRA CONFIRM issues.rpath.com Broken Link
usn/usn-353-1 - Ubuntu: Linux for human beings UBUNTU www.ubuntu.com Third Party Advisory
www.openssl.org/news/secadv_20060928.txt CONFIRM www.openssl.org Patch, Third Party Advisory
Security Announcement SUSE www.novell.com Broken Link
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
Ubuntu update for openssl - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Advisories - Mandriva Linux MANDRIVA www.mandriva.com Broken Link
IBM HMC OpenSSH / OpenSSL Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
OpenSSL SSLv2 Null Pointer Dereference Client Denial of Service Vulnerability BID www.securityfocus.com Patch, Third Party Advisory, VDB Entry
Mandriva update for ntp - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
OpenPKG Corporation: Security: Security Advisories OPENPKG www.openpkg.org Third Party Advisory
Debian update for openssl - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Cisco Security Response: Multiple Vulnerabilities in OpenSSL Library  [Cisco GSS 4400 Series Global Site Selector Appliances] - Cisco Systems CISCO www.cisco.com Third Party Advisory
OpenVPN 2.0.x Change Log CONFIRM openvpn.net Third Party Advisory
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
Repository / Oval Repository OVAL oval.cisecurity.org Third Party Advisory
VMware Workstation 5.5 Release Notes CONFIRM www.vmware.com Third Party Advisory
Cisco Products OpenSSL Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
rPath update for openssl - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
ASA-2006-260 HP-UX OpenSSL Denial of Service (DoS), Increase Privilige (HPSBUX02174) CONFIRM support.avaya.com Third Party Advisory
HP Insight Management Agents SSL Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Webmail - OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
HP-UX update for OpenSSL - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
About the security content of Security Update 2006-007 CONFIRM docs.info.apple.com Third Party Advisory
VMware ACE Release Notes CONFIRM www.vmware.com Third Party Advisory
Debian -- Security Information -- DSA-1195-1 openssl096 DEBIAN www.debian.org Third Party Advisory
VMware Player Release Notes CONFIRM www.vmware.com Third Party Advisory
[Full-disclosure] [SECURITY] OpenSSL 0.9.8d and 0.9.7l released FULLDISC lists.grok.org.uk Mailing List, Third Party Advisory
cwRsync OpenSSL Vulnerabilities and OpenSSH Weakness - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Avaya PDS HP-UX Secure Shell / OpenSSL Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
#102711: Security Vulnerabilities in OpenSSL May Lead to a Denial of Service (DoS) to Applications or Execution of Arbitrary Code With Elevated Privileges SUNALERT sunsolve.sun.com Broken Link
Trustix updates for openssh and openssl - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Gentoo update for openssl - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Mandriva update for MySQL - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
OpenBSD 4.0 errata OPENBSD openbsd.org Third Party Advisory
www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf CONFIRM www.xerox.com Third Party Advisory
Sun Solaris OpenSSL Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
404 Not Found CONFIRM kolab.org Broken Link
Gentoo Linux Documentation -- OpenSSL: Multiple vulnerabilities GENTOO security.gentoo.org Third Party Advisory
Gentoo update for emul-linux-x86-baselibs - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Gentoo Linux Documentation -- AMD64 x86 emulation base libraries: OpenSSL multiple vulnerabilities GENTOO www.gentoo.org Third Party Advisory
IT Resource Center - login / register HP itrc.hp.com Broken Link
Slackware update for openssl - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
SSRT071304 HP www2.itrc.hp.com Broken Link
SecurityFocus BUGTRAQ www.securityfocus.com
Advisories - Mandriva Linux MANDRIVA www.mandriva.com Third Party Advisory
Download Patch ESX-3069097 for VMware ESX Server 3.0.1 CONFIRM www.vmware.com Third Party Advisory
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
201531 SUNALERT sunsolve.sun.com Broken Link
VMware Server 1.0.5 and Workstation 6.0.3 Multiple Vulnerabilities BID www.securityfocus.com Third Party Advisory, VDB Entry
Red Hat Network Satellite Server Update for Solaris Client - Advisories - Community SECUNIA secunia.com Third Party Advisory
SecurityFocus BUGTRAQ www.securityfocus.com
Oracle January 2007 Security Update Multiple Vulnerabilities BID www.securityfocus.com Third Party Advisory, VDB Entry
Webmail - OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
FileZilla / FileZilla Server Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
HP-UX update for Apache - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
VMware ESX Server 2.0.2 Upgrade Patch 4 (for 2.0.2 Systems) CONFIRM www.vmware.com Third Party Advisory
ASA-2006-220 (RHSA-2006-0695) CONFIRM support.avaya.com Third Party Advisory
NetBSD-SA2008-007 NETBSD ftp.netbsd.org Third Party Advisory
Webmail - OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
Avaya Products OpenSSL Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com Third Party Advisory
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
Webmail - OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com Permissions Required, Third Party Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

OrganizationPublishedContributorStatement
Red Hat2007-03-14Mark J CoxRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

Legacy QID Mappings

  • 390284 Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2023-0013)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report