Lucene search

K
f5F5F5:K15565
HistorySep 05, 2014 - 12:00 a.m.

K15565 : OpenSSL vulnerability CVE-2014-3512

2014-09-0500:00:00
my.f5.com
14

4.8 Medium

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.931 High

EPSS

Percentile

98.9%

Security Advisory Description

Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter. (CVE-2014-3512)

Impact

A malicious client or server may be able to overrun an internal buffer by sending invalid Secure Remote Password (SRP) parameters. Only applications which are explicitly set up for SRP use are affected.

4.8 Medium

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.931 High

EPSS

Percentile

98.9%