Race condition vulnerability in OpenSSL's ssl3_read_bytes function allows for data injection and denial of service attacks in multithreaded environments

Race condition vulnerability in OpenSSL's ssl3_read_bytes function allows for data injection and denial of service attacks in multithreaded environments

CVE-2010-5298 · MEDIUM Severity

AV:N/AC:H/AU:N/C:N/I:P/A:P

Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.

Learn more about our Web Application Penetration Testing UK.