Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T03:26:11.631Z
Reserved: 2010-10-08T00:00:00
Link: CVE-2010-3864

No data.

Status : Modified
Published: 2010-11-17T16:00:01.763
Modified: 2024-11-21T01:19:46.920
Link: CVE-2010-3864
