The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2014-06-05 21:55
Updated : 2023-11-07 02:18
NVD link : CVE-2014-0195
Mitre link : CVE-2014-0195
CVE.ORG link : CVE-2014-0195
JSON object : View
Products Affected
mariadb
- mariadb
fedoraproject
- fedora
opensuse
- leap
- opensuse
openssl
- openssl
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')