4.3

CVE-2014-0198

The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OpenSSLOpenSSL Version >= 1.0.0 <= 1.0.1g
MariadbMariadb Version >= 10.0.0 < 10.0.13
FedoraprojectFedora Version19
FedoraprojectFedora Version20
DebianDebian Linux Version6.0
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
OpensuseOpensuse Version12.3
OpensuseOpensuse Version13.1
SuseLinux Enterprise Desktop Version12 Update-
SuseLinux Enterprise Server Version12 Update-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 30.89% 0.966
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-476 NULL Pointer Dereference

The product dereferences a pointer that it expects to be valid but is NULL.

http://seclists.org/fulldisclosure/2014/Dec/23
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=140389274407904&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=140389355508263&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=140448122410568&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=140621259019789&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=140752315422991&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=140904544427729&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=140431828824371&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=140544599631400&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=141658880509699&w=2
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/67193
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1093837
Patch
Third Party Advisory
Issue Tracking