CVE-2014-3569
Published: 24 December 2014
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix.
Notes
Author | Note |
---|---|
mdeslaur | Ubuntu packages aren't compiled with no-ssl3, so aren't actually vulnerable to this issue. |
Priority
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
artful |
Released
(1.0.1f-1ubuntu10)
|
bionic |
Released
(1.0.1f-1ubuntu10)
|
|
cosmic |
Released
(1.0.1f-1ubuntu10)
|
|
disco |
Released
(1.0.1f-1ubuntu10)
|
|
lucid |
Released
(0.9.8k-7ubuntu8.23)
|
|
precise |
Released
(1.0.1-4ubuntu5.21)
|
|
trusty |
Released
(1.0.1f-1ubuntu2.8)
|
|
upstream |
Released
(0.9.8zd, 1.0.1k)
|
|
utopic |
Released
(1.0.1f-1ubuntu9.1)
|
|
vivid |
Released
(1.0.1f-1ubuntu10)
|
|
wily |
Released
(1.0.1f-1ubuntu10)
|
|
xenial |
Released
(1.0.1f-1ubuntu10)
|
|
yakkety |
Released
(1.0.1f-1ubuntu10)
|
|
zesty |
Released
(1.0.1f-1ubuntu10)
|
|
Patches: upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=6ce9687b5aba5391fc0de50e18779eb676d0e04d (1.0.1) upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=b82924741b4bd590da890619be671f4635e46c2b (0.9.8) |
||
openssl098 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
lucid |
Does not exist
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(0.9.8o-4squeeze18)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
precise |
Ignored
(end of life)
|