First published: Fri Jun 05 2015(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | <=0.9.8z | |
OpenSSL OpenSSL | =1.0.0 | |
OpenSSL OpenSSL | =1.0.0-beta1 | |
OpenSSL OpenSSL | =1.0.0-beta2 | |
OpenSSL OpenSSL | =1.0.0-beta3 | |
OpenSSL OpenSSL | =1.0.0-beta4 | |
OpenSSL OpenSSL | =1.0.0-beta5 | |
OpenSSL OpenSSL | =1.0.0a | |
OpenSSL OpenSSL | =1.0.0b | |
OpenSSL OpenSSL | =1.0.0c | |
OpenSSL OpenSSL | =1.0.0d | |
OpenSSL OpenSSL | =1.0.0e | |
OpenSSL OpenSSL | =1.0.0f | |
OpenSSL OpenSSL | =1.0.0g | |
OpenSSL OpenSSL | =1.0.0h | |
OpenSSL OpenSSL | =1.0.0i | |
OpenSSL OpenSSL | =1.0.0j | |
OpenSSL OpenSSL | =1.0.0k | |
OpenSSL OpenSSL | =1.0.0l | |
OpenSSL OpenSSL | =1.0.1 | |
OpenSSL OpenSSL | =1.0.1-beta1 | |
OpenSSL OpenSSL | =1.0.1-beta2 | |
OpenSSL OpenSSL | =1.0.1-beta3 | |
OpenSSL OpenSSL | =1.0.1a | |
OpenSSL OpenSSL | =1.0.1b | |
OpenSSL OpenSSL | =1.0.1c | |
OpenSSL OpenSSL | =1.0.1d | |
OpenSSL OpenSSL | =1.0.1e | |
OpenSSL OpenSSL | =1.0.1f | |
OpenSSL OpenSSL | =1.0.1g | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.14-1~deb12u1 3.0.14-1~deb12u2 3.3.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8176 is a vulnerability in OpenSSL that allows remote DTLS peers to cause a denial of service (DoS) by sending crafted application data.
CVE-2014-8176 has a severity rating of 7.5, which is considered high.
OpenSSL versions before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h are affected by CVE-2014-8176.
To fix CVE-2014-8176, it is recommended to update OpenSSL to version 0.9.8za, 1.0.0m, or 1.0.1h.
You can find more information about CVE-2014-8176 at the following references: [Link 1](https://rt.openssl.org/Ticket/Display.html?id=3286), [Link 2](https://github.com/openssl/openssl/commit/bcc31166), [Link 3](https://github.com/openssl/openssl/commit/4b258e73).