vendor:
Unknown
by:
Noam Rathaus
5.5
CVSS
MEDIUM
Denial of Service
693
CWE
Product Name: Unknown
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: CVE-2006-4343
CPE:
Metasploit:
https://www.rapid7.com/db/vulnerabilities/sunpatch-126254/, https://www.rapid7.com/db/vulnerabilities/sunpatch-125196/, https://www.rapid7.com/db/vulnerabilities/sunpatch-125197/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2006-4343/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0629/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0525/, https://www.rapid7.com/db/vulnerabilities/vmsa-2008-0005-cve-2006-4343-workstation/, https://www.rapid7.com/db/vulnerabilities/vmsa-2008-0005-cve-2006-4343-player/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2006-4343/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2006-4343/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2006-4343/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2006-2940/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0264/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2006-2937/, https://www.rapid7.com/db/vulnerabilities/apple-osx-openssl-cve-2006-4343/, https://www.rapid7.com/db/vulnerabilities/http-openssl-get-server-hello-dos/, https://www.rapid7.com/db/vulnerabilities/hpsmh-cve-2006-4343/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2006-3738/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2006-0695/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2006-0695/, https://www.rapid7.com/db/?q=CVE-2006-4343&type=&page=2, https://www.rapid7.com/db/?q=CVE-2006-4343&type=&page=2
Platforms Tested:
2007
Exploits vulnerability CVE-2006-4343
This Perl script exploits a vulnerability (CVE-2006-4343) in SSL servers, where a specially crafted SSL serverhello response can cause the SSL client to crash.
Mitigation:
Apply the relevant patch or update to a non-vulnerable version of the SSL server software.