CVE-2014-3513
Published: 15 October 2014
Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.
Notes
Author | Note |
---|---|
mdeslaur | 1.0.1 only |
Priority
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
upstream |
Released
(1.0.1j)
|
lucid |
Not vulnerable
(0.9.8k-7ubuntu8.21)
|
|
precise |
Released
(1.0.1-4ubuntu5.20)
|
|
trusty |
Released
(1.0.1f-1ubuntu2.7)
|
|
Patches: upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d (1.0.1) upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d9d09a8d0f2a42d02e9a4b11a9ac395a0e15b8ba (1.0.1) |
||
openssl098 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
lucid |
Does not exist
|
|
precise |
Not vulnerable
|
|
trusty |
Does not exist
(trusty was not-affected)
|