Description
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
Remediation
References
Related Vulnerabilities
WordPress Plugin Ultimate FAQ Cross-Site Scripting (1.8.21)
Perl Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2012-6329)
WordPress Plugin Booking Ultra Pro Appointments Booking Calendar Local File Inclusion (1.1.13)
WordPress Plugin Random image gallery with pretty photo zoom Cross-Site Scripting (7.4)
WordPress Plugin Ultimate WP Query Search Filter Cross-Site Scripting (1.0.10)