Vulnerability CVE-2014-3506: Information

Description

d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.

Severity: MEDIUM (5.0)

Published: Aug. 14, 2014
Modified: Nov. 7, 2023
Error type identifier: CWE-399

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
openssl10p91.0.1j-alt11.0.2u-alt1.p9.2ALT-PU-2014-2312-1133582Fixed
openssl10c9f21.0.1j-alt11.0.2u-alt1.p9.1ALT-PU-2014-2312-1133582Fixed
openssl10c71.0.1j-alt1.M70C.11.0.1u-alt0.M70C.1ALT-PU-2014-2316-1133754Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*

      cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*