Search for vulnerabilities
Vulnerability details: VCID-fbnp-bksk-aaaq
Vulnerability ID VCID-fbnp-bksk-aaaq
Aliases CVE-2009-1379
VC-OPENSSL-20090512-CVE-2009-1379
Summary Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function could cause a client accessing a malicious DTLS server to crash.
Status Published
Exploitability 2.0
Weighted Severity 6.2
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2009:1335
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.06505 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.07182 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.07182 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.07182 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.07182 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.07182 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.09313 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
epss 0.11735 https://api.first.org/data/v1/epss?cve=CVE-2009-1379
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=501572
generic_textual MODERATE http://security.gentoo.org/glsa/glsa-200912-01.xml
generic_textual MODERATE https://kb.bluecoat.com/index?page=content&id=SA50
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2009-1379
Reference id Reference type URL
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-009.txt.asc
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
http://rt.openssl.org/Ticket/Display.html?id=1923&user=guest&pass=guest
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1379.json
https://api.first.org/data/v1/epss?cve=CVE-2009-1379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379
http://secunia.com/advisories/35416
http://secunia.com/advisories/35461
http://secunia.com/advisories/35571
http://secunia.com/advisories/35729
http://secunia.com/advisories/36533
http://secunia.com/advisories/37003
http://secunia.com/advisories/38761
http://secunia.com/advisories/38794
http://secunia.com/advisories/38834
http://secunia.com/advisories/42724
http://secunia.com/advisories/42733
http://security.gentoo.org/glsa/glsa-200912-01.xml
https://exchange.xforce.ibmcloud.com/vulnerabilities/50661
https://github.com/openssl/openssl/commit/561cbe567846a376153bea7f1f2d061e78029c2d
https://kb.bluecoat.com/index?page=content&id=SA50
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049
https://launchpad.net/bugs/cve/2009-1379
http://sourceforge.net/mailarchive/message.php?msg_name=4AD43807.7080105%40users.sourceforge.net
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6848
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9744
https://web.archive.org/web/20100824233642/http://rt.openssl.org/Ticket/Display.html?id=1923&user=guest&pass=guest
http://voodoo-circle.sourceforge.net/sa/sa-20091012-01.html
http://www.openwall.com/lists/oss-security/2009/05/18/4
http://www.redhat.com/support/errata/RHSA-2009-1335.html
http://www.securityfocus.com/bid/35138
http://www.securitytracker.com/id?1022241
http://www.ubuntu.com/usn/USN-792-1
http://www.vupen.com/english/advisories/2009/1377
http://www.vupen.com/english/advisories/2010/0528
501572 https://bugzilla.redhat.com/show_bug.cgi?id=501572
530400 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=530400
cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
CVE-2009-1379 https://nvd.nist.gov/vuln/detail/CVE-2009-1379
CVE-2009-1379;OSVDB-54614 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/8720.c
GLSA-200912-01 https://security.gentoo.org/glsa/200912-01
RHSA-2009:1335 https://access.redhat.com/errata/RHSA-2009:1335
USN-792-1 https://usn.ubuntu.com/792-1/
Data source Exploit-DB
Date added May 17, 2009
Description OpenSSL 0.9.8k/1.0.0-beta2 - DTLS Remote Memory Exhaustion Denial of Service
Ransomware campaign use Known
Source publication date May 18, 2009
Exploit type dos
Platform multiple
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2009-1379
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.90196
EPSS Score 0.06505
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.