Lucene search

K
ubuntucveUbuntu.comUB:CVE-2014-3569
HistoryDec 24, 2014 - 12:00 a.m.

CVE-2014-3569

2014-12-2400:00:00
ubuntu.com
ubuntu.com
11

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.891 High

EPSS

Percentile

98.7%

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc,
1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported
protocols, which allows remote attackers to cause a denial of service (NULL
pointer dereference and daemon crash) via an unexpected handshake, as
demonstrated by an SSLv3 handshake to a no-ssl3 application with certain
error handling. NOTE: this issue became relevant after the CVE-2014-3568
fix.

Bugs

Notes

Author Note
mdeslaur Ubuntu packages aren’t compiled with no-ssl3, so aren’t actually vulnerable to this issue.
OSVersionArchitecturePackageVersionFilename
ubuntu17.10noarchopenssl< 1.0.1f-1ubuntu10UNKNOWN
ubuntu18.04noarchopenssl< 1.0.1f-1ubuntu10UNKNOWN
ubuntu18.10noarchopenssl< 1.0.1f-1ubuntu10UNKNOWN
ubuntu19.04noarchopenssl< 1.0.1f-1ubuntu10UNKNOWN
ubuntu10.04noarchopenssl< 0.9.8k-7ubuntu8.23UNKNOWN
ubuntu12.04noarchopenssl< 1.0.1-4ubuntu5.21UNKNOWN
ubuntu14.04noarchopenssl< 1.0.1f-1ubuntu2.8UNKNOWN
ubuntu14.10noarchopenssl< 1.0.1f-1ubuntu9.1UNKNOWN
ubuntu15.04noarchopenssl< 1.0.1f-1ubuntu10UNKNOWN
ubuntu15.10noarchopenssl< 1.0.1f-1ubuntu10UNKNOWN
Rows per page:
1-10 of 131

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.891 High

EPSS

Percentile

98.7%