In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openssl | Openssl | 1.1.0 (including) | 1.1.0 (including) |
Openssl | Openssl | 1.1.0a (including) | 1.1.0a (including) |
Openssl | Openssl | 1.1.0b (including) | 1.1.0b (including) |
Openssl | Openssl | 1.1.0c (including) | 1.1.0c (including) |