CVE-2014-0195

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
05/06/2014
Last modified:
12/04/2025

Description

The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 0.9.8 (including) 0.9.8za (excluding)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1.0.0 (including) 1.0.0m (excluding)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1.0.1 (including) 1.0.1h (excluding)
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* 10.0.0 (including) 10.0.13 (excluding)
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*


References to Advisories, Solutions, and Tools