Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-0195

Опубликовано: 05 июн. 2014
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8

Описание

The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.

РелизСтатусПримечание
devel

released

1.0.1f-1ubuntu4
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.2
lucid

not-affected

code is different
precise

released

1.0.1-4ubuntu5.14
saucy

released

1.0.1e-3ubuntu1.4
trusty

released

1.0.1f-1ubuntu2.2
trusty/esm

not-affected

1.0.1f-1ubuntu2.2
upstream

released

1.0.1h

Показывать по

РелизСтатусПримечание
devel

released

0.9.8o-7ubuntu4
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [0.9.8o-7ubuntu3.2.14.04.1]]
lucid

DNE

precise

released

0.9.8o-7ubuntu3.2
saucy

released

0.9.8o-7ubuntu3.2.13.10.1
trusty

released

0.9.8o-7ubuntu3.2.14.04.1
trusty/esm

DNE

trusty was released [0.9.8o-7ubuntu3.2.14.04.1]
upstream

released

0.9.8za

Показывать по

6.8 Medium

CVSS2

Связанные уязвимости

redhat
около 11 лет назад

The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.

nvd
около 11 лет назад

The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.

debian
около 11 лет назад

The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before ...

github
около 3 лет назад

The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.

fstec
около 11 лет назад

Уязвимость программного обеспечения OpenSSL, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

6.8 Medium

CVSS2