OpenSSL Invalid GOST parameters DoS Attack Vulnerability
26 Jan. 2012
Summary
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
A malicious TLS client can send an invalid set of GOST parameters which will cause the server to crash due to lack of error checking.
This could be used in a denial-of-service attack.
Vendor Status:
OpenSSL core team had issued an update for this vulnerability