Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2006-4343NULL Pointer Dereference in Openssl

Severity
4.3MEDIUMNVD
EPSS
6.9%
top 8.56%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 28
Latest updateMay 3

Description

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages5 packages

debiandebian/openssl< openssl 0.9.8c-2 (bookworm)
Debianopenssl/openssl< 0.9.8c-2+3
NVDopenssl/openssl16 versions+15

Also affects: Debian Linux 3.1, Ubuntu Linux 5.04, 5.10, 6.06

Patches

🔴Vulnerability Details

2
GHSA
GHSA-vrm9-vqv5-39gr: The get_server_hello function in the SSLv2 client code in OpenSSL 02022-05-03
OSV
CVE-2006-4343: The get_server_hello function in the SSLv2 client code in OpenSSL 02006-09-28

💥Exploits & PoCs

2
Exploit-DB
OpenSSL < 0.9.7l/0.9.8d - SSLv2 Client Crash2007-12-23
Exploit-DB
OpenSSL SSLv2 - Null Pointer Dereference Client Denial of Service2006-09-28

📋Vendor Advisories

6
VMware
Several critical security vulnerabilities have been addressed in the newest releases of VMware's hosted product line2008-03-17
Cisco
Multiple Vulnerabilities in OpenSSL Library2006-11-08
Ubuntu
openssl vulnerabilities2006-09-29
BSD
FreeBSD-SA-06:23.openssl: Multiple problems in crypto(3)2006-09-28
Red Hat
openssl sslv2 client code2006-09-28

💬Community

3
Bugzilla
CVE-2006-4343 openssl sslv2 client code2008-01-29
Bugzilla
CVE-2006-3738 OpenSSL issues (CVE-2006-4343, CVE-2006-2940, CVE-2006-2937, CVE-2006-4339)2006-10-03
Bugzilla
CVE-2006-3738 OpenSSL issues (CVE-2006-4343)2006-09-18