CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
98.7%
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc,
1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported
protocols, which allows remote attackers to cause a denial of service (NULL
pointer dereference and daemon crash) via an unexpected handshake, as
demonstrated by an SSLv3 handshake to a no-ssl3 application with certain
error handling. NOTE: this issue became relevant after the CVE-2014-3568
fix.
Author | Note |
---|---|
mdeslaur | Ubuntu packages aren’t compiled with no-ssl3, so aren’t actually vulnerable to this issue. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 17.10 | noarch | openssl | < 1.0.1f-1ubuntu10 | UNKNOWN |
ubuntu | 18.04 | noarch | openssl | < 1.0.1f-1ubuntu10 | UNKNOWN |
ubuntu | 18.10 | noarch | openssl | < 1.0.1f-1ubuntu10 | UNKNOWN |
ubuntu | 19.04 | noarch | openssl | < 1.0.1f-1ubuntu10 | UNKNOWN |
ubuntu | 10.04 | noarch | openssl | < 0.9.8k-7ubuntu8.23 | UNKNOWN |
ubuntu | 12.04 | noarch | openssl | < 1.0.1-4ubuntu5.21 | UNKNOWN |
ubuntu | 14.04 | noarch | openssl | < 1.0.1f-1ubuntu2.8 | UNKNOWN |
ubuntu | 14.10 | noarch | openssl | < 1.0.1f-1ubuntu9.1 | UNKNOWN |
ubuntu | 15.04 | noarch | openssl | < 1.0.1f-1ubuntu10 | UNKNOWN |
ubuntu | 15.10 | noarch | openssl | < 1.0.1f-1ubuntu10 | UNKNOWN |