First published: Wed Aug 13 2014(Updated: )
The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =1.0.1 | |
OpenSSL libcrypto | =1.0.1-beta1 | |
OpenSSL libcrypto | =1.0.1-beta2 | |
OpenSSL libcrypto | =1.0.1-beta3 | |
OpenSSL libcrypto | =1.0.1a | |
OpenSSL libcrypto | =1.0.1b | |
OpenSSL libcrypto | =1.0.1c | |
OpenSSL libcrypto | =1.0.1d | |
OpenSSL libcrypto | =1.0.1e | |
OpenSSL libcrypto | =1.0.1f | |
OpenSSL libcrypto | =1.0.1g | |
OpenSSL libcrypto | =1.0.1h |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5139 is classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2014-5139, you should upgrade OpenSSL to version 1.0.1i or later.
CVE-2014-5139 affects all versions of OpenSSL 1.0.1 prior to 1.0.1i, including beta releases.
CVE-2014-5139 can lead to client application crashes due to a null pointer dereference.
Yes, CVE-2014-5139 is specifically related to SRP ciphersuites in the SSL ServerHello message.