CVE-2014-0198
Published: 2 May 2014
The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
Notes
Author | Note |
---|---|
mdeslaur |
introduced by https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8671b898609777c95aedf33743419a523874e6e8 |
Priority
Status
Package | Release | Status |
---|---|---|
openssl
Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
(code not present)
|
precise |
Released
(1.0.1-4ubuntu5.13)
|
|
quantal |
Released
(1.0.1c-3ubuntu2.8)
|
|
saucy |
Released
(1.0.1e-3ubuntu1.3)
|
|
trusty |
Released
(1.0.1f-1ubuntu2.1)
|
|
upstream |
Needs triage
|
|
Patches:
vendor: http://anoncvs.estpak.ee/cgi-bin/cgit/openbsd-src/commit/lib/libssl?id=e76e308f1fab2253ab5b4ef52a1865c5ffecdf21 vendor: http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/005_openssl.patch.sig |
||
openssl098
Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Not vulnerable
(code not present)
|
|
quantal |
Not vulnerable
(code not present)
|
|
saucy |
Not vulnerable
(code not present)
|
|
trusty |
Does not exist
(trusty was not-affected [code not present])
|
|
upstream |
Needs triage
|