CVE-2014-0195

OpenSSL DTLS Fragment Buffer Overflow DoS

Title source: metasploit

Description

The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.

Exploits (3)

nomisec WORKING POC 3 stars
by ricedu · poc
https://github.com/ricedu/CVE-2014-0195
nomisec WORKING POC
by PezwariNaan · poc
https://github.com/PezwariNaan/CVE-2014-0195
metasploit WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/ssl/dtls_fragment_overflow.rb

References (126)

... and 106 more

Scores

EPSS 0.9278
EPSS Percentile 99.8%

Details

CWE
CWE-120
Status published
Products (6)
fedoraproject/fedora 19
fedoraproject/fedora 20
mariadb/mariadb 10.0.0 - 10.0.13
openssl/openssl 0.9.8 - 0.9.8za
opensuse/leap 42.1
opensuse/opensuse 13.2
Published Jun 05, 2014
Tracked Since Feb 18, 2026