Description
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-132-1 | openssl security update |
Debian DSA |
DSA-3125-1 | openssl security update |
Ubuntu USN |
USN-2459-1 | OpenSSL vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T10:50:17.372Z
Reserved: 2014-05-14T00:00:00.000Z
Link: CVE-2014-3571
No data.
Status : Modified
Published: 2015-01-09T02:59:01.287
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-3571
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Ubuntu USN