Your submission was sent successfully! Close

CVE-2014-3512

Published: 7 August 2014

Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.

Priority

Medium

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
lucid Not vulnerable

precise
Released (1.0.1-4ubuntu5.17)
trusty
Released (1.0.1f-1ubuntu2.5)
upstream
Released (1.0.1i)
Patches:
upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=966fe81f9befbff62522a158006fb03050a868df (1.0.1)
upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d15d17bb6487a3e7b59a22882b6a22300fe5111d (1.0.1)
openssl098
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Not vulnerable

trusty Does not exist
(trusty was not-affected)
upstream Not vulnerable