Lucene search

K
opensslOpenSSLOPENSSL:CVE-2014-3513
HistoryOct 15, 2014 - 12:00 a.m.

Vulnerability in OpenSSL CVE-2014-3513

2014-10-1500:00:00
www.openssl.org
36

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

4.5 Medium

AI Score

Confidence

High

0.823 High

EPSS

Percentile

98.4%

A flaw in the DTLS SRTP extension parsing code allows an attacker, who sends a carefully crafted handshake message, to cause OpenSSL to fail to free up to 64k of memory causing a memory leak. This could be exploited in a Denial Of Service attack. This issue affects OpenSSL 1.0.1 server implementations for both SSL/TLS and DTLS regardless of whether SRTP is used or configured. Implementations of OpenSSL that have been compiled with OPENSSL_NO_SRTP defined are not affected.

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

4.5 Medium

AI Score

Confidence

High

0.823 High

EPSS

Percentile

98.4%