CWE
399
Advisory Published
CVE Published
Updated

CVE-2014-3507

First published: Thu Aug 07 2014(Updated: )

It was found that an attacker could force OpenSSL to leak memory and never free it via DTLS packets.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
redhat/openssl<1.0.1
1.0.1
redhat/openssl<0.9.8
0.9.8
OpenSSL libcrypto=0.9.8
OpenSSL libcrypto=0.9.8a
OpenSSL libcrypto=0.9.8b
OpenSSL libcrypto=0.9.8c
OpenSSL libcrypto=0.9.8d
OpenSSL libcrypto=0.9.8e
OpenSSL libcrypto=0.9.8f
OpenSSL libcrypto=0.9.8g
OpenSSL libcrypto=0.9.8h
OpenSSL libcrypto=0.9.8i
OpenSSL libcrypto=0.9.8j
OpenSSL libcrypto=0.9.8k
OpenSSL libcrypto=0.9.8l
OpenSSL libcrypto=0.9.8m
OpenSSL libcrypto=0.9.8m-beta1
OpenSSL libcrypto=0.9.8n
OpenSSL libcrypto=0.9.8o
OpenSSL libcrypto=0.9.8p
OpenSSL libcrypto=0.9.8q
OpenSSL libcrypto=0.9.8r
OpenSSL libcrypto=0.9.8s
OpenSSL libcrypto=0.9.8t
OpenSSL libcrypto=0.9.8u
OpenSSL libcrypto=0.9.8v
OpenSSL libcrypto=0.9.8w
OpenSSL libcrypto=0.9.8x
OpenSSL libcrypto=0.9.8y
OpenSSL libcrypto=0.9.8za
OpenSSL libcrypto=1.0.0
OpenSSL libcrypto=1.0.0-beta1
OpenSSL libcrypto=1.0.0-beta2
OpenSSL libcrypto=1.0.0-beta3
OpenSSL libcrypto=1.0.0-beta4
OpenSSL libcrypto=1.0.0-beta5
OpenSSL libcrypto=1.0.0a
OpenSSL libcrypto=1.0.0b
OpenSSL libcrypto=1.0.0c
OpenSSL libcrypto=1.0.0d
OpenSSL libcrypto=1.0.0e
OpenSSL libcrypto=1.0.0f
OpenSSL libcrypto=1.0.0g
OpenSSL libcrypto=1.0.0h
OpenSSL libcrypto=1.0.0i
OpenSSL libcrypto=1.0.0j
OpenSSL libcrypto=1.0.0k
OpenSSL libcrypto=1.0.0l
OpenSSL libcrypto=1.0.0m
OpenSSL libcrypto=1.0.1
OpenSSL libcrypto=1.0.1-beta1
OpenSSL libcrypto=1.0.1-beta2
OpenSSL libcrypto=1.0.1-beta3
OpenSSL libcrypto=1.0.1a
OpenSSL libcrypto=1.0.1b
OpenSSL libcrypto=1.0.1c
OpenSSL libcrypto=1.0.1d
OpenSSL libcrypto=1.0.1e
OpenSSL libcrypto=1.0.1f
OpenSSL libcrypto=1.0.1g
OpenSSL libcrypto=1.0.1h

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2014-3507?

    CVE-2014-3507 is rated as a medium severity vulnerability as it allows remote attackers to cause a denial of service through a memory leak.

  • How do I fix CVE-2014-3507?

    To fix CVE-2014-3507, you should upgrade OpenSSL to version 0.9.8zb or later, 1.0.0n or later, or 1.0.1i or later.

  • What versions of OpenSSL are affected by CVE-2014-3507?

    CVE-2014-3507 affects OpenSSL versions prior to 0.9.8zb, 1.0.0n, and 1.0.1i.

  • What type of threat does CVE-2014-3507 pose?

    CVE-2014-3507 poses a threat of denial of service due to a memory leak vulnerability when processing DTLS packets.

  • Is CVE-2014-3507 exploitable remotely?

    Yes, CVE-2014-3507 can be exploited remotely, allowing attackers to trigger the vulnerability without physical access.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203