Executive Summary

Informations
Name CVE-2014-5139 First vendor Publication 2014-08-13
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:25983
 
Oval ID: oval:org.mitre.oval:def:25983
Title: AIX OpenSSL Denial of Service due to NULL pointer dereference
Description: The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
Family: unix Class: vulnerability
Reference(s): CVE-2014-5139
Version: 4
Platform(s): IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26351
 
Oval ID: oval:org.mitre.oval:def:26351
Title: DSA-2998-1 openssl - security update
Description: Multiple vulnerabilities have been identified in OpenSSL, a Secure Sockets Layer toolkit, that may result in denial of service (application crash, large memory consumption), information leak, protocol downgrade. Additionally, a buffer overrun affecting only applications explicitly set up for SRP has been fixed (<a href="https://security-tracker.debian.org/tracker/CVE-2014-3512">CVE-2014-3512</a>).
Family: unix Class: patch
Reference(s): DSA-2998-1
CVE-2014-3505
CVE-2014-3506
CVE-2014-3507
CVE-2014-3508
CVE-2014-3509
CVE-2014-3510
CVE-2014-3511
CVE-2014-3512
CVE-2014-5139
Version: 3
Platform(s): Debian GNU/Linux 7.0
Debian GNU/kFreeBSD 7.0
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26369
 
Oval ID: oval:org.mitre.oval:def:26369
Title: Vulnerability in OpenSSL 1.0.1 before 1.0.1i, allows remote SSL servers to cause a denial of service
Description: The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
Family: windows Class: vulnerability
Reference(s): CVE-2014-5139
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): OpenSSL
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26381
 
Oval ID: oval:org.mitre.oval:def:26381
Title: USN-2308-1 -- openssl vulnerabilities
Description: Several security issues were fixed in OpenSSL.
Family: unix Class: patch
Reference(s): USN-2308-1
CVE-2014-3505
CVE-2014-3506
CVE-2014-3507
CVE-2014-3508
CVE-2014-3509
CVE-2014-3510
CVE-2014-3511
CVE-2014-3512
CVE-2014-5139
Version: 3
Platform(s): Ubuntu 14.04
Ubuntu 12.04
Ubuntu 10.04
Product(s): openssl
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 12

Nessus® Vulnerability Scanner

Date Description
2015-08-03 Name : The remote web server is affected by multiple vulnerabilities.
File : hpsmh_7_4_1.nasl - Type : ACT_GATHER_INFO
2015-03-12 Name : The remote host has software installed that is affected by multiple vulnerabi...
File : ibm_rational_clearquest_8_0_1_6.nasl - Type : ACT_GATHER_INFO
2015-03-05 Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_8_0_15.nasl - Type : ACT_GATHER_INFO
2015-03-05 Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_7_0_57.nasl - Type : ACT_GATHER_INFO
2015-03-05 Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_6_0_43.nasl - Type : ACT_GATHER_INFO
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_openssl_20140915.nasl - Type : ACT_GATHER_INFO
2014-12-26 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201412-39.nasl - Type : ACT_GATHER_INFO
2014-10-14 Name : The remote device is missing a vendor-supplied security patch.
File : juniper_jsa10649.nasl - Type : ACT_GATHER_INFO
2014-10-12 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-391.nasl - Type : ACT_GATHER_INFO
2014-10-07 Name : The remote Windows host has an application installed that is affected by mult...
File : winscp_5_5_5.nasl - Type : ACT_GATHER_INFO
2014-09-10 Name : The remote AIX host has a version of OpenSSL installed that is affected by mu...
File : aix_openssl_advisory10.nasl - Type : ACT_GATHER_INFO
2014-08-22 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-509.nasl - Type : ACT_GATHER_INFO
2014-08-13 Name : The remote Windows host contains a program that is affected by multiple vulne...
File : stunnel_5_03.nasl - Type : ACT_GATHER_INFO
2014-08-09 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2014-220-01.nasl - Type : ACT_GATHER_INFO
2014-08-08 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2308-1.nasl - Type : ACT_GATHER_INFO
2014-08-08 Name : The remote service is affected by multiple vulnerabilities.
File : openssl_1_0_1i.nasl - Type : ACT_GATHER_INFO
2014-08-07 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2998.nasl - Type : ACT_GATHER_INFO
2014-08-07 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_8aff07eb1dbd11e4b6ba3c970e169bc2.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=80bd7b41b30af6ee...
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=83764a989dcc87fb...
Source Url
BID http://www.securityfocus.com/bid/69077
CONFIRM http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
http://www-01.ibm.com/support/docview.wss?uid=swg21682293
http://www-01.ibm.com/support/docview.wss?uid=swg21683389
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisorie...
http://www.tenable.com/security/tns-2014-06
https://www.openssl.org/news/secadv_20140806.txt
DEBIAN http://www.debian.org/security/2014/dsa-2998
FREEBSD https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
GENTOO http://security.gentoo.org/glsa/glsa-201412-39.xml
HP http://marc.info/?l=bugtraq&m=142350350616251&w=2
http://marc.info/?l=bugtraq&m=142495837901899&w=2
http://marc.info/?l=bugtraq&m=142624590206005&w=2
http://marc.info/?l=bugtraq&m=142624619906067
http://marc.info/?l=bugtraq&m=142624619906067&w=2
http://marc.info/?l=bugtraq&m=142624679706236&w=2
http://marc.info/?l=bugtraq&m=142624719706349&w=2
http://marc.info/?l=bugtraq&m=142660345230545&w=2
http://marc.info/?l=bugtraq&m=142791032306609&w=2
http://marc.info/?l=bugtraq&m=143290437727362&w=2
http://marc.info/?l=bugtraq&m=143290522027658&w=2
MLIST https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
NETBSD ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
SECTRACK http://www.securitytracker.com/id/1030693
SECUNIA http://secunia.com/advisories/59700
http://secunia.com/advisories/59710
http://secunia.com/advisories/59756
http://secunia.com/advisories/60022
http://secunia.com/advisories/60221
http://secunia.com/advisories/60493
http://secunia.com/advisories/60803
http://secunia.com/advisories/60810
http://secunia.com/advisories/60917
http://secunia.com/advisories/60921
http://secunia.com/advisories/61017
http://secunia.com/advisories/61100
http://secunia.com/advisories/61171
http://secunia.com/advisories/61184
http://secunia.com/advisories/61392
http://secunia.com/advisories/61775
http://secunia.com/advisories/61959
SUSE http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
Date Informations
2024-02-02 01:28:24
  • Multiple Updates
2024-02-01 12:08:24
  • Multiple Updates
2023-11-07 21:45:23
  • Multiple Updates
2023-09-05 12:26:55
  • Multiple Updates
2023-09-05 01:08:17
  • Multiple Updates
2023-09-02 12:26:55
  • Multiple Updates
2023-09-02 01:08:24
  • Multiple Updates
2023-08-12 12:29:19
  • Multiple Updates
2023-08-12 01:07:54
  • Multiple Updates
2023-08-11 12:25:03
  • Multiple Updates
2023-08-11 01:08:06
  • Multiple Updates
2023-08-06 12:24:20
  • Multiple Updates
2023-08-06 01:07:52
  • Multiple Updates
2023-08-04 12:24:24
  • Multiple Updates
2023-08-04 01:07:57
  • Multiple Updates
2023-07-14 12:24:23
  • Multiple Updates
2023-07-14 01:07:55
  • Multiple Updates
2023-03-29 01:26:12
  • Multiple Updates
2023-03-28 12:08:16
  • Multiple Updates
2022-10-11 12:22:00
  • Multiple Updates
2022-10-11 01:08:04
  • Multiple Updates
2021-05-04 12:33:24
  • Multiple Updates
2021-04-22 01:40:08
  • Multiple Updates
2020-05-23 00:41:44
  • Multiple Updates
2019-03-18 12:02:47
  • Multiple Updates
2017-01-07 09:25:41
  • Multiple Updates
2016-08-23 09:24:52
  • Multiple Updates
2016-04-27 01:04:40
  • Multiple Updates
2016-03-30 13:26:11
  • Multiple Updates
2015-04-07 09:27:01
  • Multiple Updates
2015-03-24 09:27:56
  • Multiple Updates
2015-03-21 00:26:12
  • Multiple Updates
2015-03-20 00:26:10
  • Multiple Updates
2015-03-18 09:27:16
  • Multiple Updates
2015-03-17 09:26:18
  • Multiple Updates
2015-03-13 13:24:54
  • Multiple Updates
2015-03-06 13:25:51
  • Multiple Updates
2015-02-27 21:23:48
  • Multiple Updates
2015-02-21 09:23:46
  • Multiple Updates
2015-01-21 13:26:58
  • Multiple Updates
2014-12-27 13:25:08
  • Multiple Updates
2014-11-19 09:24:19
  • Multiple Updates
2014-11-14 13:28:39
  • Multiple Updates
2014-10-24 13:27:16
  • Multiple Updates
2014-10-16 13:25:34
  • Multiple Updates
2014-10-12 13:27:26
  • Multiple Updates
2014-10-08 13:25:04
  • Multiple Updates
2014-09-13 13:43:48
  • Multiple Updates
2014-09-11 13:25:49
  • Multiple Updates
2014-09-04 13:25:54
  • Multiple Updates
2014-08-23 13:27:48
  • Multiple Updates
2014-08-22 13:27:38
  • Multiple Updates
2014-08-15 21:26:51
  • Multiple Updates
2014-08-14 21:28:25
  • Multiple Updates
2014-08-14 13:25:01
  • Multiple Updates
2014-08-14 05:23:02
  • First insertion