First published: Fri May 02 2014(Updated: )
The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
OpenSSL | >=1.0.0<=1.0.1g | |
MariaDB | >=10.0.0<10.0.13 | |
Red Hat Fedora | =19 | |
Red Hat Fedora | =20 | |
Debian Linux | =6.0 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Workstation Extension | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0198 has a severity rating that indicates it can cause denial of service due to a NULL pointer dereference.
To fix CVE-2014-0198, upgrade OpenSSL to version 1.0.1h or later.
OpenSSL versions from 1.0.0 through 1.0.1g are affected by CVE-2014-0198.
Yes, CVE-2014-0198 allows remote attackers to trigger a denial of service condition.
If using a vulnerable version related to CVE-2014-0198, it is important to apply the security updates and patches provided by your distribution.