Executive Summary

Informations
NameCVE-2014-3507First vendor Publication2014-08-13
VendorCveLast vendor Modification2017-08-28

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507

CWE : Common Weakness Enumeration

%idName
100 %CWE-399Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:26293
 
Oval ID: oval:org.mitre.oval:def:26293
Title: Vulnerability in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, allows remote attackers to cause a denial of service (CVE-2014-3507)
Description: Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
Family: windows Class: vulnerability
Reference(s): CVE-2014-3507
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): OpenSSL
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26697
 
Oval ID: oval:org.mitre.oval:def:26697
Title: HP-UX running OpenSSL, Multiple Vulnerabilities
Description: Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
Family: unix Class: vulnerability
Reference(s): CVE-2014-3507
Version: 8
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26802
 
Oval ID: oval:org.mitre.oval:def:26802
Title: AIX OpenSSL Denial of Service due to improper handling of the return value
Description: Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
Family: unix Class: vulnerability
Reference(s): CVE-2014-3507
Version: 4
Platform(s): IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application59

Nessus® Vulnerability Scanner

DateDescription
2016-03-04Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-294.nasl - Type : ACT_GATHER_INFO
2015-03-26Name : The remote Debian host is missing a security update.
File : debian_DLA-33.nasl - Type : ACT_GATHER_INFO
2015-03-05Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_6_0_43.nasl - Type : ACT_GATHER_INFO
2015-03-05Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_7_0_57.nasl - Type : ACT_GATHER_INFO
2015-03-05Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_8_0_15.nasl - Type : ACT_GATHER_INFO
2015-01-19Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_openssl_20140915.nasl - Type : ACT_GATHER_INFO
2015-01-02Name : The remote Fedora host is missing a security update.
File : fedora_2014-17576.nasl - Type : ACT_GATHER_INFO
2015-01-02Name : The remote Fedora host is missing a security update.
File : fedora_2014-17587.nasl - Type : ACT_GATHER_INFO
2014-12-26Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201412-39.nasl - Type : ACT_GATHER_INFO
2014-11-26Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2014-0012.nasl - Type : ACT_GATHER_INFO
2014-11-26Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2014-0032.nasl - Type : ACT_GATHER_INFO
2014-11-12Name : The remote host has an application installed that is affected by multiple vul...
File : vmware_vcenter_converter_2014-0010.nasl - Type : ACT_GATHER_INFO
2014-11-08Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1054.nasl - Type : ACT_GATHER_INFO
2014-10-12Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-391.nasl - Type : ACT_GATHER_INFO
2014-10-07Name : The remote Windows host has an application installed that is affected by mult...
File : winscp_5_5_5.nasl - Type : ACT_GATHER_INFO
2014-09-10Name : The remote AIX host has a version of OpenSSL installed that is affected by mu...
File : aix_openssl_advisory10.nasl - Type : ACT_GATHER_INFO
2014-08-22Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-509.nasl - Type : ACT_GATHER_INFO
2014-08-21Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_libopenssl-devel-140812.nasl - Type : ACT_GATHER_INFO
2014-08-15Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20140813_openssl_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2014-08-14Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-1052.nasl - Type : ACT_GATHER_INFO
2014-08-14Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-1052.nasl - Type : ACT_GATHER_INFO
2014-08-14Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1052.nasl - Type : ACT_GATHER_INFO
2014-08-13Name : The remote Windows host contains a program that is affected by multiple vulne...
File : stunnel_5_03.nasl - Type : ACT_GATHER_INFO
2014-08-10Name : The remote Fedora host is missing a security update.
File : fedora_2014-9301.nasl - Type : ACT_GATHER_INFO
2014-08-10Name : The remote Fedora host is missing a security update.
File : fedora_2014-9308.nasl - Type : ACT_GATHER_INFO
2014-08-09Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2014-220-01.nasl - Type : ACT_GATHER_INFO
2014-08-09Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-158.nasl - Type : ACT_GATHER_INFO
2014-08-08Name : The remote service is affected by multiple vulnerabilities.
File : openssl_0_9_8zb.nasl - Type : ACT_GATHER_INFO
2014-08-08Name : The remote service is affected by multiple vulnerabilities.
File : openssl_1_0_0n.nasl - Type : ACT_GATHER_INFO
2014-08-08Name : The remote service is affected by multiple vulnerabilities.
File : openssl_1_0_1i.nasl - Type : ACT_GATHER_INFO
2014-08-08Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2308-1.nasl - Type : ACT_GATHER_INFO
2014-08-07Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2998.nasl - Type : ACT_GATHER_INFO
2014-08-07Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_8aff07eb1dbd11e4b6ba3c970e169bc2.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/69078
CONFIRM http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
http://linux.oracle.com/errata/ELSA-2014-1052.html
http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
http://www-01.ibm.com/support/docview.wss?uid=swg21682293
http://www-01.ibm.com/support/docview.wss?uid=swg21683389
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisorie...
https://bugzilla.redhat.com/show_bug.cgi?id=1127502
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d0a4b7d1a2948fce3851...
https://kc.mcafee.com/corporate/index?page=content&id=SB10109
https://www.openssl.org/news/secadv_20140806.txt
DEBIAN http://www.debian.org/security/2014/dsa-2998
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470....
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473....
FREEBSD https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
GENTOO http://security.gentoo.org/glsa/glsa-201412-39.xml
HP http://marc.info/?l=bugtraq&m=140853041709441&w=2
http://marc.info/?l=bugtraq&m=141077370928502&w=2
http://marc.info/?l=bugtraq&m=142660345230545&w=2
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2014:158
MLIST https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
NETBSD ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
SECTRACK http://www.securitytracker.com/id/1030693
SECUNIA http://secunia.com/advisories/58962
http://secunia.com/advisories/59700
http://secunia.com/advisories/59710
http://secunia.com/advisories/59743
http://secunia.com/advisories/60022
http://secunia.com/advisories/60221
http://secunia.com/advisories/60493
http://secunia.com/advisories/60684
http://secunia.com/advisories/60778
http://secunia.com/advisories/60803
http://secunia.com/advisories/61017
http://secunia.com/advisories/61040
http://secunia.com/advisories/61100
http://secunia.com/advisories/61184
http://secunia.com/advisories/61250
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/95161

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
DateInformations
2017-08-29 09:24:34
  • Multiple Updates
2017-01-07 09:25:35
  • Multiple Updates
2017-01-03 09:22:53
  • Multiple Updates
2016-12-03 09:23:57
  • Multiple Updates
2016-04-27 00:51:13
  • Multiple Updates
2016-03-05 13:26:42
  • Multiple Updates
2015-07-18 13:28:14
  • Multiple Updates
2015-03-27 13:28:11
  • Multiple Updates
2015-03-24 09:27:31
  • Multiple Updates
2015-03-06 13:25:46
  • Multiple Updates
2015-02-27 21:23:30
  • Multiple Updates
2015-02-21 09:23:22
  • Multiple Updates
2015-01-21 13:26:52
  • Multiple Updates
2015-01-03 13:25:54
  • Multiple Updates
2014-12-27 13:25:04
  • Multiple Updates
2014-11-27 13:28:30
  • Multiple Updates
2014-11-19 09:23:36
  • Multiple Updates
2014-11-14 13:27:56
  • Multiple Updates
2014-11-08 13:31:47
  • Multiple Updates
2014-10-24 13:26:33
  • Multiple Updates
2014-10-12 13:27:20
  • Multiple Updates
2014-10-08 13:25:02
  • Multiple Updates
2014-09-13 13:43:27
  • Multiple Updates
2014-09-11 13:25:45
  • Multiple Updates
2014-09-04 13:25:42
  • Multiple Updates
2014-08-23 13:27:42
  • Multiple Updates
2014-08-22 13:26:48
  • Multiple Updates
2014-08-22 00:23:14
  • Multiple Updates
2014-08-16 13:27:18
  • Multiple Updates
2014-08-15 13:27:49
  • Multiple Updates
2014-08-14 21:28:17
  • Multiple Updates
2014-08-14 13:24:52
  • Multiple Updates
2014-08-14 05:22:56
  • First insertion