First published: Thu Aug 07 2014(Updated: )
It was found that OpenSSL DTLS clients using anonymous (EC)DH ciphersuites could be crashed by a malicious server via a handshake message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <0.9.8 | 0.9.8 |
OpenSSL libcrypto | =0.9.8 | |
OpenSSL libcrypto | =0.9.8a | |
OpenSSL libcrypto | =0.9.8b | |
OpenSSL libcrypto | =0.9.8c | |
OpenSSL libcrypto | =0.9.8d | |
OpenSSL libcrypto | =0.9.8e | |
OpenSSL libcrypto | =0.9.8f | |
OpenSSL libcrypto | =0.9.8g | |
OpenSSL libcrypto | =0.9.8h | |
OpenSSL libcrypto | =0.9.8i | |
OpenSSL libcrypto | =0.9.8j | |
OpenSSL libcrypto | =0.9.8k | |
OpenSSL libcrypto | =0.9.8l | |
OpenSSL libcrypto | =0.9.8m | |
OpenSSL libcrypto | =0.9.8m-beta1 | |
OpenSSL libcrypto | =0.9.8n | |
OpenSSL libcrypto | =0.9.8o | |
OpenSSL libcrypto | =0.9.8p | |
OpenSSL libcrypto | =0.9.8q | |
OpenSSL libcrypto | =0.9.8r | |
OpenSSL libcrypto | =0.9.8s | |
OpenSSL libcrypto | =0.9.8t | |
OpenSSL libcrypto | =0.9.8u | |
OpenSSL libcrypto | =0.9.8v | |
OpenSSL libcrypto | =0.9.8w | |
OpenSSL libcrypto | =0.9.8x | |
OpenSSL libcrypto | =0.9.8y | |
OpenSSL libcrypto | =0.9.8za | |
OpenSSL libcrypto | =1.0.0 | |
OpenSSL libcrypto | =1.0.0-beta1 | |
OpenSSL libcrypto | =1.0.0-beta2 | |
OpenSSL libcrypto | =1.0.0-beta3 | |
OpenSSL libcrypto | =1.0.0-beta4 | |
OpenSSL libcrypto | =1.0.0-beta5 | |
OpenSSL libcrypto | =1.0.0a | |
OpenSSL libcrypto | =1.0.0b | |
OpenSSL libcrypto | =1.0.0c | |
OpenSSL libcrypto | =1.0.0d | |
OpenSSL libcrypto | =1.0.0e | |
OpenSSL libcrypto | =1.0.0f | |
OpenSSL libcrypto | =1.0.0g | |
OpenSSL libcrypto | =1.0.0h | |
OpenSSL libcrypto | =1.0.0i | |
OpenSSL libcrypto | =1.0.0j | |
OpenSSL libcrypto | =1.0.0k | |
OpenSSL libcrypto | =1.0.0l | |
OpenSSL libcrypto | =1.0.0m | |
OpenSSL libcrypto | =1.0.1 | |
OpenSSL libcrypto | =1.0.1-beta1 | |
OpenSSL libcrypto | =1.0.1-beta2 | |
OpenSSL libcrypto | =1.0.1-beta3 | |
OpenSSL libcrypto | =1.0.1a | |
OpenSSL libcrypto | =1.0.1b | |
OpenSSL libcrypto | =1.0.1c | |
OpenSSL libcrypto | =1.0.1d | |
OpenSSL libcrypto | =1.0.1e | |
OpenSSL libcrypto | =1.0.1f | |
OpenSSL libcrypto | =1.0.1g | |
OpenSSL libcrypto | =1.0.1h |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3510 is rated as a high severity vulnerability due to its potential to crash applications using vulnerable OpenSSL versions.
To fix CVE-2014-3510, upgrade to OpenSSL version 0.9.8zb, 1.0.0n, or 1.0.1i or later.
CVE-2014-3510 affects OpenSSL versions 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i.
If you do not patch CVE-2014-3510, your system remains vulnerable to crashes from malicious DTLS handshake messages.
Yes, CVE-2014-3510 specifically affects OpenSSL DTLS clients connecting to malicious servers using vulnerable ciphersuites.