Executive Summary

Informations
Name CVE-2014-3511 First vendor Publication 2014-08-13
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:26342
 
Oval ID: oval:org.mitre.oval:def:26342
Title: Vulnerability in OpenSSL 1.0.1 before 1.0.1i, allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue
Description: The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
Family: windows Class: vulnerability
Reference(s): CVE-2014-3511
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): OpenSSL
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26347
 
Oval ID: oval:org.mitre.oval:def:26347
Title: AIX OpenSSL Man-in-the-Middle attack related to protocol downgrade issue
Description: The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
Family: unix Class: vulnerability
Reference(s): CVE-2014-3511
Version: 4
Platform(s): IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26426
 
Oval ID: oval:org.mitre.oval:def:26426
Title: RHSA-2014:1052: openssl security update (Moderate)
Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library. A race condition was found in the way OpenSSL handled ServerHello messages with an included Supported EC Point Format extension. A malicious server could possibly use this flaw to cause a multi-threaded TLS/SSL client using OpenSSL to write into freed memory, causing the client to crash or execute arbitrary code. (CVE-2014-3509) It was discovered that the OBJ_obj2txt() function could fail to properly NUL-terminate its output. This could possibly cause an application using OpenSSL functions to format fields of X.509 certificates to disclose portions of its memory. (CVE-2014-3508) A flaw was found in the way OpenSSL handled fragmented handshake packets. A man-in-the-middle attacker could use this flaw to force a TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client and the server supported newer protocol versions. (CVE-2014-3511) Multiple flaws were discovered in the way OpenSSL handled DTLS packets. A remote attacker could use these flaws to cause a DTLS server or client using OpenSSL to crash or use excessive amounts of memory. (CVE-2014-3505, CVE-2014-3506, CVE-2014-3507) A NULL pointer dereference flaw was found in the way OpenSSL performed a handshake when using the anonymous Diffie-Hellman (DH) key exchange. A malicious server could cause a DTLS client using OpenSSL to crash if that client had anonymous DH cipher suites enabled. (CVE-2014-3510) All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.
Family: unix Class: patch
Reference(s): RHSA-2014:1052-00
CESA-2014:1052
CVE-2014-3505
CVE-2014-3506
CVE-2014-3507
CVE-2014-3508
CVE-2014-3509
CVE-2014-3510
CVE-2014-3511
Version: 3
Platform(s): Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
CentOS Linux 6
CentOS Linux 7
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27233
 
Oval ID: oval:org.mitre.oval:def:27233
Title: ELSA-2014-1052 -- openssl security update (moderate)
Description: [1.0.1e-34.4] - fix CVE-2014-3505 - doublefree in DTLS packet processing - fix CVE-2014-3506 - avoid memory exhaustion in DTLS - fix CVE-2014-3507 - avoid memory leak in DTLS - fix CVE-2014-3508 - fix OID handling to avoid information leak - fix CVE-2014-3509 - fix race condition when parsing server hello - fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS - fix CVE-2014-3511 - disallow protocol downgrade via fragmentation
Family: unix Class: patch
Reference(s): ELSA-2014-1052
CVE-2014-3505
CVE-2014-3506
CVE-2014-3507
CVE-2014-3508
CVE-2014-3509
CVE-2014-3510
CVE-2014-3511
Version: 5
Platform(s): Oracle Linux 6
Oracle Linux 7
Product(s): openssl
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 31

Information Assurance Vulnerability Management (IAVM)

Date Description
2015-01-22 IAVM : 2015-B-0007 - Multiple Vulnerabilities in Juniper Secure Analytics (JSA) and Security Threa...
Severity : Category I - VMSKEY : V0058213

Snort® IPS/IDS

Date Description
2015-03-24 OpenSSL fragmented protocol downgrade attempt
RuleID : 33561 - Revision : 2 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2015-09-01 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-0197.nasl - Type : ACT_GATHER_INFO
2015-08-03 Name : The remote web server is affected by multiple vulnerabilities.
File : hpsmh_7_4_1.nasl - Type : ACT_GATHER_INFO
2015-03-12 Name : The remote host has software installed that is affected by multiple vulnerabi...
File : ibm_rational_clearquest_8_0_1_6.nasl - Type : ACT_GATHER_INFO
2015-03-05 Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_8_0_15.nasl - Type : ACT_GATHER_INFO
2015-03-05 Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_7_0_57.nasl - Type : ACT_GATHER_INFO
2015-03-05 Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_6_0_43.nasl - Type : ACT_GATHER_INFO
2015-02-06 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2015-0126.nasl - Type : ACT_GATHER_INFO
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_openssl_20141014_2.nasl - Type : ACT_GATHER_INFO
2015-01-02 Name : The remote Fedora host is missing a security update.
File : fedora_2014-17587.nasl - Type : ACT_GATHER_INFO
2015-01-02 Name : The remote Fedora host is missing a security update.
File : fedora_2014-17576.nasl - Type : ACT_GATHER_INFO
2014-12-26 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201412-39.nasl - Type : ACT_GATHER_INFO
2014-12-04 Name : The remote web server contains an application that is affected by multiple vu...
File : splunk_614.nasl - Type : ACT_GATHER_INFO
2014-12-04 Name : The remote web server contains an application that is affected by multiple vu...
File : splunk_606.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2014-0032.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2014-0012.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1054.nasl - Type : ACT_GATHER_INFO
2014-10-14 Name : The remote device is missing a vendor-supplied security patch.
File : juniper_jsa10649.nasl - Type : ACT_GATHER_INFO
2014-10-12 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-391.nasl - Type : ACT_GATHER_INFO
2014-10-10 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL15564.nasl - Type : ACT_GATHER_INFO
2014-10-07 Name : The remote Windows host has an application installed that is affected by mult...
File : winscp_5_5_5.nasl - Type : ACT_GATHER_INFO
2014-09-10 Name : The remote AIX host has a version of OpenSSL installed that is affected by mu...
File : aix_openssl_advisory10.nasl - Type : ACT_GATHER_INFO
2014-08-22 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-509.nasl - Type : ACT_GATHER_INFO
2014-08-15 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20140813_openssl_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2014-08-14 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-1052.nasl - Type : ACT_GATHER_INFO
2014-08-14 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-1052.nasl - Type : ACT_GATHER_INFO
2014-08-14 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1052.nasl - Type : ACT_GATHER_INFO
2014-08-13 Name : The remote Windows host contains a program that is affected by multiple vulne...
File : stunnel_5_03.nasl - Type : ACT_GATHER_INFO
2014-08-10 Name : The remote Fedora host is missing a security update.
File : fedora_2014-9308.nasl - Type : ACT_GATHER_INFO
2014-08-10 Name : The remote Fedora host is missing a security update.
File : fedora_2014-9301.nasl - Type : ACT_GATHER_INFO
2014-08-09 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2014-220-01.nasl - Type : ACT_GATHER_INFO
2014-08-08 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2308-1.nasl - Type : ACT_GATHER_INFO
2014-08-08 Name : The remote service is affected by multiple vulnerabilities.
File : openssl_1_0_1i.nasl - Type : ACT_GATHER_INFO
2014-08-07 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2998.nasl - Type : ACT_GATHER_INFO
2014-08-07 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_8aff07eb1dbd11e4b6ba3c970e169bc2.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=280b1f1ad12131de...
Source Url
BID http://www.securityfocus.com/bid/69079
CONFIRM http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
http://linux.oracle.com/errata/ELSA-2014-1052.html
http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
http://www-01.ibm.com/support/docview.wss?uid=swg21682293
http://www-01.ibm.com/support/docview.wss?uid=swg21683389
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
http://www.arubanetworks.com/support/alerts/aid-08182014.txt
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisorie...
http://www.splunk.com/view/SP-CAAANHS
http://www.tenable.com/security/tns-2014-06
https://bugzilla.redhat.com/show_bug.cgi?id=1127504
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
https://kc.mcafee.com/corporate/index?page=content&id=SB10084
https://support.citrix.com/article/CTX216642
https://techzone.ergon.ch/CVE-2014-3511
https://www.openssl.org/news/secadv_20140806.txt
DEBIAN http://www.debian.org/security/2014/dsa-2998
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470....
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473....
FREEBSD https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
GENTOO http://security.gentoo.org/glsa/glsa-201412-39.xml
HP http://marc.info/?l=bugtraq&m=142350350616251&w=2
http://marc.info/?l=bugtraq&m=142495837901899&w=2
http://marc.info/?l=bugtraq&m=142624590206005&w=2
http://marc.info/?l=bugtraq&m=142660345230545&w=2
http://marc.info/?l=bugtraq&m=142791032306609&w=2
http://marc.info/?l=bugtraq&m=143290437727362&w=2
http://marc.info/?l=bugtraq&m=143290522027658&w=2
MLIST https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
NETBSD ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
REDHAT http://rhn.redhat.com/errata/RHSA-2015-0126.html
http://rhn.redhat.com/errata/RHSA-2015-0197.html
SECTRACK http://www.securitytracker.com/id/1030693
SECUNIA http://secunia.com/advisories/58962
http://secunia.com/advisories/59700
http://secunia.com/advisories/59710
http://secunia.com/advisories/59756
http://secunia.com/advisories/59887
http://secunia.com/advisories/60022
http://secunia.com/advisories/60221
http://secunia.com/advisories/60377
http://secunia.com/advisories/60493
http://secunia.com/advisories/60684
http://secunia.com/advisories/60803
http://secunia.com/advisories/60810
http://secunia.com/advisories/60890
http://secunia.com/advisories/60917
http://secunia.com/advisories/60921
http://secunia.com/advisories/60938
http://secunia.com/advisories/61017
http://secunia.com/advisories/61043
http://secunia.com/advisories/61100
http://secunia.com/advisories/61139
http://secunia.com/advisories/61184
http://secunia.com/advisories/61775
http://secunia.com/advisories/61959
SUSE http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/95162

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
Date Informations
2024-02-02 01:27:33
  • Multiple Updates
2024-02-01 12:08:10
  • Multiple Updates
2023-11-07 21:45:23
  • Multiple Updates
2023-09-05 12:26:06
  • Multiple Updates
2023-09-05 01:08:04
  • Multiple Updates
2023-09-02 12:26:07
  • Multiple Updates
2023-09-02 01:08:11
  • Multiple Updates
2023-08-12 12:28:26
  • Multiple Updates
2023-08-12 01:07:41
  • Multiple Updates
2023-08-11 12:24:15
  • Multiple Updates
2023-08-11 01:07:53
  • Multiple Updates
2023-08-06 12:23:33
  • Multiple Updates
2023-08-06 01:07:40
  • Multiple Updates
2023-08-04 12:23:36
  • Multiple Updates
2023-08-04 01:07:44
  • Multiple Updates
2023-07-14 12:23:35
  • Multiple Updates
2023-07-14 01:07:43
  • Multiple Updates
2023-03-29 01:25:26
  • Multiple Updates
2023-03-28 12:08:03
  • Multiple Updates
2022-10-11 12:21:18
  • Multiple Updates
2022-10-11 01:07:51
  • Multiple Updates
2021-05-04 12:32:26
  • Multiple Updates
2021-04-22 01:39:25
  • Multiple Updates
2020-05-23 00:41:04
  • Multiple Updates
2019-03-19 12:06:24
  • Multiple Updates
2017-11-15 09:23:51
  • Multiple Updates
2017-08-29 09:24:34
  • Multiple Updates
2017-01-07 09:25:35
  • Multiple Updates
2016-08-23 09:24:50
  • Multiple Updates
2016-08-20 09:22:29
  • Multiple Updates
2016-08-17 09:23:49
  • Multiple Updates
2016-04-27 00:51:16
  • Multiple Updates
2016-03-30 13:26:11
  • Multiple Updates
2015-10-18 17:22:35
  • Multiple Updates
2015-09-02 13:39:09
  • Multiple Updates
2015-04-07 09:26:53
  • Multiple Updates
2015-03-24 21:25:58
  • Multiple Updates
2015-03-24 09:27:34
  • Multiple Updates
2015-03-21 00:25:45
  • Multiple Updates
2015-03-20 00:25:38
  • Multiple Updates
2015-03-18 09:26:46
  • Multiple Updates
2015-03-17 09:25:55
  • Multiple Updates
2015-03-13 13:24:52
  • Multiple Updates
2015-03-06 13:25:47
  • Multiple Updates
2015-02-27 21:23:31
  • Multiple Updates
2015-02-21 09:23:24
  • Multiple Updates
2015-02-07 13:25:09
  • Multiple Updates
2015-01-21 13:26:53
  • Multiple Updates
2015-01-03 13:25:54
  • Multiple Updates
2014-12-27 13:25:05
  • Multiple Updates
2014-12-05 13:27:02
  • Multiple Updates
2014-11-27 13:28:31
  • Multiple Updates
2014-11-19 09:23:38
  • Multiple Updates
2014-11-14 13:27:58
  • Multiple Updates
2014-11-08 13:31:47
  • Multiple Updates
2014-10-24 13:26:35
  • Multiple Updates
2014-10-18 13:26:47
  • Multiple Updates
2014-10-16 13:25:24
  • Multiple Updates
2014-10-12 13:27:21
  • Multiple Updates
2014-10-11 13:26:23
  • Multiple Updates
2014-10-08 13:25:03
  • Multiple Updates
2014-09-13 13:43:29
  • Multiple Updates
2014-09-11 13:25:47
  • Multiple Updates
2014-09-04 13:25:44
  • Multiple Updates
2014-08-23 13:27:43
  • Multiple Updates
2014-08-16 13:27:19
  • Multiple Updates
2014-08-15 13:27:49
  • Multiple Updates
2014-08-14 21:28:18
  • Multiple Updates
2014-08-14 13:24:55
  • Multiple Updates
2014-08-14 05:22:56
  • First insertion