Lucene search

K
cve[email protected]CVE-2014-0195
HistoryJun 05, 2014 - 9:55 p.m.

CVE-2014-0195

2014-06-0521:55:06
CWE-120
web.nvd.nist.gov
116
openssl
vulnerability
dtls1_reassemble_fragment
buffer overflow
application crash
nvd
cve-2014-0195

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.8 High

AI Score

Confidence

High

0.968 High

EPSS

Percentile

99.7%

The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.

Affected configurations

NVD
Node
opensslopensslRange0.9.80.9.8za
OR
opensslopensslRange1.0.01.0.0m
OR
opensslopensslRange1.0.11.0.1h
Node
mariadbmariadbRange10.0.010.0.13
Node
opensuseleapMatch42.1
OR
opensuseopensuseMatch13.2
Node
fedoraprojectfedoraMatch19
OR
fedoraprojectfedoraMatch20

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.8 High

AI Score

Confidence

High

0.968 High

EPSS

Percentile

99.7%