First published: Sun Oct 19 2014(Updated: )
Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =1.0.1 | |
OpenSSL libcrypto | =1.0.1-beta1 | |
OpenSSL libcrypto | =1.0.1-beta2 | |
OpenSSL libcrypto | =1.0.1-beta3 | |
OpenSSL libcrypto | =1.0.1a | |
OpenSSL libcrypto | =1.0.1b | |
OpenSSL libcrypto | =1.0.1c | |
OpenSSL libcrypto | =1.0.1d | |
OpenSSL libcrypto | =1.0.1e | |
OpenSSL libcrypto | =1.0.1f | |
OpenSSL libcrypto | =1.0.1g | |
OpenSSL libcrypto | =1.0.1h | |
OpenSSL libcrypto | =1.0.1i |
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3513 is classified as a moderate severity vulnerability due to its potential to cause denial of service.
The best way to fix CVE-2014-3513 is to upgrade OpenSSL to version 1.0.1j or later.
CVE-2014-3513 affects various versions of OpenSSL 1.0.1, including beta releases and patch versions.
CVE-2014-3513 exploits a memory leak in the DTLS SRTP extension during the handshake process.
The potential impacts of CVE-2014-3513 include denial of service through excessive memory consumption.