Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-9424

Опубликовано: 29 дек. 2014
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

Double free vulnerability in the ssl_parse_clienthello_use_srtp_ext function in d1_srtp.c in LibreSSL before 2.1.2 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a certain length-verification error during processing of a DTLS handshake.

Отчет

Not vulnerable. This issue does not affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5, 6 and 7.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5opensslNot affected
Red Hat Enterprise Linux 6opensslNot affected
Red Hat Enterprise Linux 7opensslNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1177569libressl: Double-free in ssl_parse_clienthello_use_srtp_ext() function

EPSS

Процентиль: 64%
0.0046
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

nvd
около 11 лет назад

Double free vulnerability in the ssl_parse_clienthello_use_srtp_ext function in d1_srtp.c in LibreSSL before 2.1.2 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a certain length-verification error during processing of a DTLS handshake.

debian
около 11 лет назад

Double free vulnerability in the ssl_parse_clienthello_use_srtp_ext fu ...

github
больше 3 лет назад

Double free vulnerability in the ssl_parse_clienthello_use_srtp_ext function in d1_srtp.c in LibreSSL before 2.1.2 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a certain length-verification error during processing of a DTLS handshake.

EPSS

Процентиль: 64%
0.0046
Низкий

4.3 Medium

CVSS2