CVE-2014-3571

Published: 08 January 2015

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.

Priority

Medium

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
Upstream
Released (0.9.8zd, 1.0.1k)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.0.1f-1ubuntu10)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1.0.1f-1ubuntu10)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1.0.1f-1ubuntu2.8)
Patches:
Upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8d7aab986b499f34d9e1bc58fbfd77f05c38116e (1.0.1)
Upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=45fe66b8ba026186aa5d8ef1e0e6010ea74d5c0b (1.0.1)
Upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=46bf0ba87665c5aa215673d87e9ee7dd4ce28359 (0.9.8)
Upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=50befdb659585b9840264c77708d2dc638624137 (0.9.8)
openssl098
Launchpad, Ubuntu, Debian
Upstream
Released (0.9.8zd, 1.0.1k)
Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)