CVE-2014-3507

Openssl - Resource Management Error

Title source: rule
STIX 2.1

Description

Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.

Exploits (1)

nomisec WORKING POC
by Satheesh575555 · poc
https://github.com/Satheesh575555/openSSL_1.0.1g_CVE-2014-3507

References (50)

Core 50
Core References
Mailing List vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
Various Sources x_refsource_confirm
http://linux.oracle.com/errata/ELSA-2014-1052.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/60221
Various Sources x_refsource_confirm
http://www-01.ibm.com/support/docview.wss?uid=swg21682293
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/60778
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/61184
Mailing List vendor-advisory x_refsource_hp
http://marc.info/?l=bugtraq&m=142660345230545&w=2
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/60022
Vendor Advisory x_refsource_confirm
https://www.openssl.org/news/secadv_20140806.txt
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/61040
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/61017
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/61250
Various Sources x_refsource_confirm
http://www-01.ibm.com/support/docview.wss?uid=swg21683389
Third Party Advisory vendor-advisory x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-201412-39.xml
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/60803
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/60824
Mailing List vendor-advisory x_refsource_hp
http://marc.info/?l=bugtraq&m=140853041709441&w=2
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/59700
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1030693
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/59743
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/60917
Vendor Advisory vendor-advisory x_refsource_netbsd
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/60493
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/59710
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/60921
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/95161
Mailing List vendor-advisory x_refsource_hp
http://marc.info/?l=bugtraq&m=141077370928502&w=2
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/69078
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/61100
Vendor Advisory vendor-advisory x_refsource_freebsd
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/61775
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2014/dsa-2998
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/61959
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/59756
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/58962
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/60938
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/60684
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2014:158
Various Sources x_refsource_confirm
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1127502

Scores

EPSS 0.6603
EPSS Percentile 98.5%

Details

CWE
CWE-399
Status published
Products (42)
openssl/openssl 0.9.8
openssl/openssl 0.9.8a
openssl/openssl 0.9.8b
openssl/openssl 0.9.8c
openssl/openssl 0.9.8d
openssl/openssl 0.9.8e
openssl/openssl 0.9.8f
openssl/openssl 0.9.8g
openssl/openssl 0.9.8h
openssl/openssl 0.9.8i
... and 32 more
Published Aug 13, 2014
Tracked Since Feb 18, 2026