The PK11_SESSION cache in the OpenSSL PKCS#11 engine in Sun Solaris 10 does not maintain reference counts for operations with asymmetric keys, which allows context-dependent attackers to cause a denial of service (failed cryptographic operations) via unspecified vectors, related to the (1) RSA_sign and (2) RSA_verify functions.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5914
https://exchange.xforce.ibmcloud.com/vulnerabilities/47137
http://www.vupen.com/english/advisories/2008/3372
http://www.securitytracker.com/id?1021358
http://www.securityfocus.com/bid/32671
http://sunsolve.sun.com/search/document.do?assetkey=1-26-246846-1
http://sunsolve.sun.com/search/document.do?assetkey=1-21-139459-01-1
http://sunsolve.sun.com/search/document.do?assetkey=1-21-138863-02-1