Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3568

Опубликовано: 19 окт. 2014
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3

Описание

OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.

РелизСтатусПримечание
artful

released

1.0.1f-1ubuntu9
bionic

released

1.0.1f-1ubuntu9
cosmic

released

1.0.1f-1ubuntu9
devel

released

1.0.1f-1ubuntu9
disco

released

1.0.1f-1ubuntu9
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.7
esm-infra/bionic

not-affected

1.0.1f-1ubuntu9
esm-infra/xenial

not-affected

1.0.1f-1ubuntu9
lucid

released

0.9.8k-7ubuntu8.22
precise

released

1.0.1-4ubuntu5.20

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 89%
0.04408
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.

nvd
почти 11 лет назад

OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.

debian
почти 11 лет назад

OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j d ...

github
около 3 лет назад

OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.

fstec
почти 11 лет назад

Уязвимость программного обеспечения OpenSSL, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации

EPSS

Процентиль: 89%
0.04408
Низкий

4.3 Medium

CVSS2