CVE-2006-4343

Public Exploit

Description

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.

Category

4.3
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 26.88% Top 5%
Vendor Advisory mandriva.com Vendor Advisory hp.com Vendor Advisory trustix.org Vendor Advisory debian.org Vendor Advisory ubuntu.com Vendor Advisory hp.com Vendor Advisory gentoo.org Vendor Advisory redhat.com Vendor Advisory novell.com Vendor Advisory novell.com Vendor Advisory hp.com Vendor Advisory freebsd.org Vendor Advisory marc.info Vendor Advisory openbsd.org Vendor Advisory mandriva.com Vendor Advisory redhat.com Vendor Advisory gentoo.org Vendor Advisory slackware.com Vendor Advisory apple.com Vendor Advisory hp.com Vendor Advisory openpkg.org Vendor Advisory sun.com Vendor Advisory netbsd.org Vendor Advisory debian.org Vendor Advisory sgi.com Vendor Advisory mandriva.com Vendor Advisory cisco.com Vendor Advisory sun.com Vendor Advisory cisco.com Vendor Advisory sun.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://www.mandriva.com/security/advisories?name=MDKSA-2006:172 third party advisory vendor advisory
http://secunia.com/advisories/22212 third party advisory
http://www.vupen.com/english/advisories/2006/4750 permissions required vdb entry third party advisory
https://www.exploit-db.com/exploits/4773 exploit vdb entry third party advisory
http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html third party advisory
http://secunia.com/advisories/23915 third party advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771 vendor advisory broken link
http://securitytracker.com/id?1016943 vdb entry third party advisory
http://secunia.com/advisories/23038 third party advisory
http://www.trustix.org/errata/2006/0054 vendor advisory broken link
https://exchange.xforce.ibmcloud.com/vulnerabilities/29240 vdb entry third party advisory
http://www.debian.org/security/2006/dsa-1195 third party advisory vendor advisory
http://secunia.com/advisories/23309 third party advisory
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html third party advisory
http://www.vupen.com/english/advisories/2006/4401 permissions required vdb entry third party advisory
http://www.ubuntu.com/usn/usn-353-1 third party advisory vendor advisory
http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227 broken link
http://secunia.com/advisories/22116 third party advisory
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144 vendor advisory broken link
http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm third party advisory
http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml third party advisory vendor advisory
http://secunia.com/advisories/22166 third party advisory
http://www.redhat.com/support/errata/RHSA-2006-0695.html third party advisory vendor advisory
http://secunia.com/advisories/23340 third party advisory
http://secunia.com/advisories/22385 third party advisory
http://www.novell.com/linux/security/advisories/2006_24_sr.html vendor advisory broken link
http://secunia.com/advisories/22758 third party advisory
http://secunia.com/advisories/22487 third party advisory
http://www.novell.com/linux/security/advisories/2006_58_openssl.html vendor advisory broken link
http://secunia.com/advisories/22772 third party advisory
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540 vendor advisory broken link
http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc third party advisory vendor advisory
http://secunia.com/advisories/22165 third party advisory
http://docs.info.apple.com/article.html?artnum=304829 third party advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html third party advisory mailing list
http://secunia.com/advisories/23794 third party advisory
http://marc.info/?l=bugtraq&m=130497311408250&w=2 mailing list third party advisory vendor advisory
http://secunia.com/advisories/22220 third party advisory
http://secunia.com/advisories/23680 third party advisory
http://openvpn.net/changelog.html third party advisory
http://www.vmware.com/support/server/doc/releasenotes_server.html third party advisory
http://secunia.com/advisories/25889 third party advisory
http://www.vupen.com/english/advisories/2006/4036 permissions required vdb entry third party advisory
http://openbsd.org/errata.html#openssl2 third party advisory vendor advisory
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html third party advisory
http://secunia.com/advisories/30124 third party advisory
http://www.ingate.com/relnote-452.php broken link
http://secunia.com/advisories/22626 third party advisory
http://www.osvdb.org/29263 vdb entry broken link
http://www.securityfocus.com/bid/22083 vdb entry third party advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:178 vendor advisory broken link
http://www.vupen.com/english/advisories/2006/3869 permissions required vdb entry third party advisory
http://secunia.com/advisories/22544 third party advisory
http://secunia.com/advisories/22298 third party advisory
http://www.vmware.com/support/player2/doc/releasenotes_player2.html third party advisory
http://secunia.com/advisories/22130 third party advisory
http://secunia.com/advisories/25420 third party advisory
http://secunia.com/advisories/31492 third party advisory
http://www.vupen.com/english/advisories/2007/1973 permissions required vdb entry third party advisory
http://secunia.com/advisories/22284 third party advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4356 vdb entry third party advisory signature
http://www.redhat.com/support/errata/RHSA-2008-0629.html third party advisory vendor advisory
http://security.gentoo.org/glsa/glsa-200610-11.xml third party advisory vendor advisory
http://issues.rpath.com/browse/RPL-613 broken link
http://secunia.com/advisories/26329 third party advisory
http://secunia.com/advisories/22260 third party advisory
http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf third party advisory
http://www.vupen.com/english/advisories/2007/0343 permissions required vdb entry third party advisory
http://www.vupen.com/english/advisories/2006/3860 permissions required vdb entry third party advisory
http://secunia.com/advisories/23280 third party advisory
http://www.securityfocus.com/archive/1/447318/100/0/threaded mailing list
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10207 vdb entry third party advisory signature
http://www.vmware.com/support/player/doc/releasenotes_player.html third party advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm third party advisory
http://www.vupen.com/english/advisories/2006/4264 permissions required vdb entry third party advisory
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html third party advisory
http://secunia.com/advisories/22193 third party advisory
http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html third party advisory
http://secunia.com/advisories/23155 third party advisory
http://secunia.com/advisories/22799 third party advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946 mailing list third party advisory vendor advisory
http://www.vupen.com/english/advisories/2006/4417 permissions required vdb entry third party advisory
http://www.kb.cert.org/vuls/id/386964 us government resource third party advisory patch
http://www.serv-u.com/releasenotes/ third party advisory
http://www.vupen.com/english/advisories/2006/4443 permissions required vdb entry third party advisory
http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html third party advisory
http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html third party advisory
http://secunia.com/advisories/22094 third party advisory
http://secunia.com/advisories/22186 third party advisory
http://www.openssl.org/news/secadv_20060928.txt third party advisory patch
http://kolab.org/security/kolab-vendor-notice-11.txt broken link
http://secunia.com/advisories/22500 third party advisory
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html mailing list third party advisory vendor advisory
http://www.us-cert.gov/cas/techalerts/TA06-333A.html third party advisory us government resource
http://www.securityfocus.com/archive/1/489739/100/0/threaded mailing list
http://secunia.com/advisories/22216 third party advisory
http://www.vupen.com/english/advisories/2006/3820 permissions required vdb entry third party advisory
http://lists.vmware.com/pipermail/security-announce/2008/000008.html third party advisory mailing list
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100 vendor advisory broken link
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html third party advisory vendor advisory
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html third party advisory
http://www.vupen.com/english/advisories/2008/0905/references permissions required vdb entry third party advisory
http://www.vupen.com/english/advisories/2007/1401 permissions required vdb entry third party advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1 vendor advisory broken link
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc third party advisory vendor advisory
http://www.vmware.com/security/advisories/VMSA-2008-0005.html third party advisory
http://www.securityfocus.com/archive/1/456546/100/200/threaded mailing list
http://www.securityfocus.com/archive/1/447393/100/0/threaded mailing list
http://www.vupen.com/english/advisories/2006/3936 permissions required vdb entry third party advisory
http://secunia.com/advisories/22240 third party advisory
http://secunia.com/advisories/22330 third party advisory
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html third party advisory
http://www.debian.org/security/2006/dsa-1185 third party advisory vendor advisory
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc third party advisory vendor advisory
http://secunia.com/advisories/22207 third party advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:177 third party advisory vendor advisory
http://securitytracker.com/id?1017522 vdb entry third party advisory
http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html third party advisory vendor advisory
http://www.vupen.com/english/advisories/2006/3902 permissions required vdb entry third party advisory
http://www.vupen.com/english/advisories/2007/2783 permissions required vdb entry third party advisory
http://secunia.com/advisories/22259 third party advisory
http://secunia.com/advisories/22460 third party advisory
http://secunia.com/advisories/22791 third party advisory
http://secunia.com/advisories/22172 third party advisory
http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html third party advisory
http://www.securityfocus.com/bid/28276 vdb entry third party advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1 vendor advisory broken link
http://www.securityfocus.com/bid/20246 vdb entry third party advisory patch
http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml third party advisory vendor advisory
http://secunia.com/advisories/24950 third party advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1 vendor advisory broken link

Frequently Asked Questions

What is the severity of CVE-2006-4343?
CVE-2006-4343 has been scored as a medium severity vulnerability.
How to fix CVE-2006-4343?
To fix CVE-2006-4343, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2006-4343 being actively exploited in the wild?
It is possible that CVE-2006-4343 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~27% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.