First published: Wed Dec 24 2014(Updated: )
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openssl | 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.13-1~deb12u1 3.0.11-1~deb12u2 3.2.2-1 3.3.1-2 | |
OpenSSL libcrypto | =1.0.1j |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3569 has a severity rating of high due to its potential to cause denial of service.
To fix CVE-2014-3569, upgrade to a version of OpenSSL that is not affected, such as 1.1.1w-0+deb11u1 or later.
CVE-2014-3569 affects OpenSSL versions 0.9.8zc, 1.0.0o, and 1.0.1j.
CVE-2014-3569 enables remote attackers to conduct denial of service attacks through unexpected handshake attempts.
No, CVE-2014-3569 is not a buffer overflow vulnerability; it involves a NULL pointer dereference leading to daemon crash.