CVE-2014-8176

HIGH

Description

The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.

References

http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015

http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html

http://rhn.redhat.com/errata/RHSA-2015-1115.html

http://rhn.redhat.com/errata/RHSA-2016-2957.html

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl

http://www.debian.org/security/2015/dsa-3287

http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015

http://www.securityfocus.com/bid/75159

http://www.securitytracker.com/id/1032564

http://www.ubuntu.com/usn/USN-2639-1

https://bto.bluecoat.com/security-advisory/sa98

https://github.com/openssl/openssl/commit/470990fee0182566d439ef7e82d1abf18b7085d7

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351

https://kc.mcafee.com/corporate/index?page=content&id=SB10122

https://openssl.org/news/secadv/20150611.txt

https://rt.openssl.org/Ticket/Display.html?id=3286&user=guest&pass=guest

https://security.gentoo.org/glsa/201506-02

https://www.openssl.org/news/secadv_20150611.txt

Details

Source: MITRE

Published: 2015-06-12

Updated: 2018-01-05

Type: CWE-119

Risk Information

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH