Lucene search

K
opensslOpenSSLOPENSSL:CVE-2014-3509
HistoryAug 06, 2014 - 12:00 a.m.

Vulnerability in OpenSSL - Race condition in ssl_parse_serverhello_tlsext

2014-08-0600:00:00
www.openssl-library.org
23

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

5.7

Confidence

Low

EPSS

0.024

Percentile

90.0%

A race condition was found in ssl_parse_serverhello_tlsext. If a multithreaded client connects to a malicious server using a resumed session and the server sends an ec point format extension, it could write up to 255 bytes to freed memory.

Found by Gabor Tyukasz (LogMeIn Inc).

Affected configurations

Vulners
Node
opensslopensslRange1.0.11.0.1i
OR
opensslopensslRange1.0.01.0.0n
VendorProductVersionCPE
opensslopenssl*cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

5.7

Confidence

Low

EPSS

0.024

Percentile

90.0%