First published: Thu Aug 07 2014(Updated: )
A vulnerability in the processing of DTLS handshake messages was found that results in large amounts of memory being used. Once the Denial Of Service attack has ceased, the memory will be freed.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <0.9.8 | 0.9.8 |
OpenSSL libcrypto | =0.9.8 | |
OpenSSL libcrypto | =0.9.8a | |
OpenSSL libcrypto | =0.9.8b | |
OpenSSL libcrypto | =0.9.8c | |
OpenSSL libcrypto | =0.9.8d | |
OpenSSL libcrypto | =0.9.8e | |
OpenSSL libcrypto | =0.9.8f | |
OpenSSL libcrypto | =0.9.8g | |
OpenSSL libcrypto | =0.9.8h | |
OpenSSL libcrypto | =0.9.8i | |
OpenSSL libcrypto | =0.9.8j | |
OpenSSL libcrypto | =0.9.8k | |
OpenSSL libcrypto | =0.9.8l | |
OpenSSL libcrypto | =0.9.8m | |
OpenSSL libcrypto | =0.9.8m-beta1 | |
OpenSSL libcrypto | =0.9.8n | |
OpenSSL libcrypto | =0.9.8o | |
OpenSSL libcrypto | =0.9.8p | |
OpenSSL libcrypto | =0.9.8q | |
OpenSSL libcrypto | =0.9.8r | |
OpenSSL libcrypto | =0.9.8s | |
OpenSSL libcrypto | =0.9.8t | |
OpenSSL libcrypto | =0.9.8u | |
OpenSSL libcrypto | =0.9.8v | |
OpenSSL libcrypto | =0.9.8w | |
OpenSSL libcrypto | =0.9.8x | |
OpenSSL libcrypto | =0.9.8y | |
OpenSSL libcrypto | =0.9.8za | |
OpenSSL libcrypto | =1.0.0 | |
OpenSSL libcrypto | =1.0.0-beta1 | |
OpenSSL libcrypto | =1.0.0-beta2 | |
OpenSSL libcrypto | =1.0.0-beta3 | |
OpenSSL libcrypto | =1.0.0-beta4 | |
OpenSSL libcrypto | =1.0.0-beta5 | |
OpenSSL libcrypto | =1.0.0a | |
OpenSSL libcrypto | =1.0.0b | |
OpenSSL libcrypto | =1.0.0c | |
OpenSSL libcrypto | =1.0.0d | |
OpenSSL libcrypto | =1.0.0e | |
OpenSSL libcrypto | =1.0.0f | |
OpenSSL libcrypto | =1.0.0g | |
OpenSSL libcrypto | =1.0.0h | |
OpenSSL libcrypto | =1.0.0i | |
OpenSSL libcrypto | =1.0.0j | |
OpenSSL libcrypto | =1.0.0k | |
OpenSSL libcrypto | =1.0.0l | |
OpenSSL libcrypto | =1.0.0m | |
OpenSSL libcrypto | =1.0.1 | |
OpenSSL libcrypto | =1.0.1-beta1 | |
OpenSSL libcrypto | =1.0.1-beta2 | |
OpenSSL libcrypto | =1.0.1-beta3 | |
OpenSSL libcrypto | =1.0.1a | |
OpenSSL libcrypto | =1.0.1b | |
OpenSSL libcrypto | =1.0.1c | |
OpenSSL libcrypto | =1.0.1d | |
OpenSSL libcrypto | =1.0.1e | |
OpenSSL libcrypto | =1.0.1f | |
OpenSSL libcrypto | =1.0.1g | |
OpenSSL libcrypto | =1.0.1h |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3506 has a severity rating of medium due to its potential to cause denial of service through excessive memory consumption during DTLS handshake messages.
To fix CVE-2014-3506, upgrade OpenSSL to version 0.9.8zb or later, or 1.0.0n or later, or 1.0.1 or later.
CVE-2014-3506 affects OpenSSL versions prior to 0.9.8zb, 1.0.0n, and 1.0.1.
No, CVE-2014-3506 primarily leads to denial of service and does not directly allow for system compromise.
Yes, CVE-2014-3506 specifically affects the DTLS (Datagram Transport Layer Security) protocol implementation in OpenSSL.