CVE-2014-0195
OpenSSL DTLS Fragment Buffer Overflow DoS
Title source: metasploitDescription
The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.
Exploits (3)
metasploit
WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/ssl/dtls_fragment_overflow.rb
References (126)
... and 106 more
Scores
EPSS
0.9278
EPSS Percentile
99.8%
Details
CWE
CWE-120
Status
published
Products (6)
fedoraproject/fedora
19
fedoraproject/fedora
20
mariadb/mariadb
10.0.0 - 10.0.13
openssl/openssl
0.9.8 - 0.9.8za
opensuse/leap
42.1
opensuse/opensuse
13.2
Published
Jun 05, 2014
Tracked Since
Feb 18, 2026