Lucene search

K
ubuntucveUbuntu.comUB:CVE-2014-0224
HistoryJun 05, 2014 - 12:00 a.m.

CVE-2014-0224

2014-06-0500:00:00
ubuntu.com
ubuntu.com
25

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.974 High

EPSS

Percentile

99.9%

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does
not properly restrict processing of ChangeCipherSpec messages, which allows
man-in-the-middle attackers to trigger use of a zero-length master key in
certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions
or obtain sensitive information, via a crafted TLS handshake, aka the “CCS
Injection” vulnerability.

OSVersionArchitecturePackageVersionFilename
ubuntu10.04noarchopenssl< 0.9.8k-7ubuntu8.18UNKNOWN
ubuntu12.04noarchopenssl< 1.0.1-4ubuntu5.14UNKNOWN
ubuntu13.10noarchopenssl< 1.0.1e-3ubuntu1.4UNKNOWN
ubuntu14.04noarchopenssl< 1.0.1f-1ubuntu2.2UNKNOWN
ubuntu12.04noarchopenssl098< 0.9.8o-7ubuntu3.2UNKNOWN
ubuntu13.10noarchopenssl098< 0.9.8o-7ubuntu3.2.13.10.1UNKNOWN
ubuntu14.04noarchopenssl098< 0.9.8o-7ubuntu3.2.14.04.1UNKNOWN

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.974 High

EPSS

Percentile

99.9%