4.3
CVSSv2

CVE-2014-3508

Published: 13/08/2014 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 prior to 0.9.8zb, 1.0.0 prior to 1.0.0n, and 1.0.1 prior to 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent malicious users to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.8b

openssl openssl 0.9.8m

openssl openssl 1.0.1

openssl openssl 0.9.8c

openssl openssl 1.0.0c

openssl openssl 1.0.0i

openssl openssl 1.0.0

openssl openssl 1.0.1h

openssl openssl 0.9.8n

openssl openssl 0.9.8p

openssl openssl 1.0.0m

openssl openssl 1.0.1c

openssl openssl 0.9.8e

openssl openssl 0.9.8u

openssl openssl 0.9.8za

openssl openssl 1.0.1g

openssl openssl 0.9.8g

openssl openssl 1.0.0h

openssl openssl 0.9.8k

openssl openssl 0.9.8d

openssl openssl 1.0.0e

openssl openssl 1.0.0f

openssl openssl 0.9.8j

openssl openssl 1.0.0d

openssl openssl 1.0.0j

openssl openssl 0.9.8s

openssl openssl 1.0.1a

openssl openssl 0.9.8l

openssl openssl 1.0.1d

openssl openssl 1.0.0k

openssl openssl 0.9.8r

openssl openssl 0.9.8t

openssl openssl 0.9.8a

openssl openssl 1.0.1b

openssl openssl 0.9.8o

openssl openssl 0.9.8q

openssl openssl 0.9.8w

openssl openssl 1.0.1e

openssl openssl 0.9.8

openssl openssl 1.0.1f

openssl openssl 1.0.0l

openssl openssl 0.9.8v

openssl openssl 0.9.8i

openssl openssl 0.9.8f

openssl openssl 0.9.8y

openssl openssl 1.0.0a

openssl openssl 0.9.8h

openssl openssl 0.9.8x

openssl openssl 1.0.0b

openssl openssl 1.0.0g

Vendor Advisories

Several security issues were fixed in OpenSSL ...
Multiple vulnerabilities have been identified in OpenSSL, a Secure Sockets Layer toolkit, that may result in denial of service (application crash, large memory consumption), information leak, protocol downgrade Additionally, a buffer overrun affecting only applications explicitly set up for SRP has been fixed (CVE-2014-3512) Detailed descriptions ...
A flaw was discovered in the way OpenSSL handled DTLS packets A remote attacker could use this flaw to cause a DTLS server or client using OpenSSL to crash or use excessive amounts of memory Multiple buffer overflows in crypto/srp/srp_libc in the SRP implementation in OpenSSL 101 before 101i allow remote attackers to cause a denial of servi ...
Description of Problem A number of security vulnerabilities have been identified in firmware used in the Lights Out Management (LOM) component across all NetScaler-based hardware appliances: Citrix NetScaler Application Delivery Controller (ADC) Citrix NetScaler Gateway Citrix NetScaler Service Delivery Appliance Citrix CloudBridge (now NetScaler S ...

Github Repositories

Repository of BinSeeker I Introduction of BinSeeker- It's a vulnerability search tool for cross-platform binary Given a vulnerability function f, BinSeeker- can identify whether a binary program contains the same vulnerability as f Currently, it support three architectures, such as X86, ARM32, MIPS32 II Prerequisites To use BinSeeker-, we need the following tools in

VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary

Repository of VulSeeker I Introduction of VulSeeker It's a semantic learning based vulnerability search tool for cross-platform binary Given a vulnerability function f, VulSeeker can identify whether a binary program contains the same vulnerability as f Currently, it support six architectures, such as X86, X64, ARM32, ARM64, MIPS32, MIPS64 If you meet any problems, pl

References

CWE-200https://www.openssl.org/news/secadv_20140806.txthttp://www.tenable.com/security/tns-2014-06http://linux.oracle.com/errata/ELSA-2014-1053.htmlhttp://secunia.com/advisories/60687http://secunia.com/advisories/59221http://secunia.com/advisories/60824http://secunia.com/advisories/60917ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.aschttp://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.aschttp://secunia.com/advisories/60938http://secunia.com/advisories/60861http://secunia.com/advisories/60921http://marc.info/?l=bugtraq&m=140973896703549&w=2http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.htmlhttp://rhn.redhat.com/errata/RHSA-2014-1297.htmlhttp://www.debian.org/security/2014/dsa-2998http://marc.info/?l=bugtraq&m=140853041709441&w=2http://marc.info/?l=bugtraq&m=141077370928502&w=2http://rhn.redhat.com/errata/RHSA-2014-1256.htmlhttp://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htmhttp://secunia.com/advisories/61775http://secunia.com/advisories/61959http://www-01.ibm.com/support/docview.wss?uid=swg21686997http://www-01.ibm.com/support/docview.wss?uid=swg21682293http://secunia.com/advisories/59756http://marc.info/?l=bugtraq&m=142495837901899&w=2http://marc.info/?l=bugtraq&m=142624590206005&w=2http://marc.info/?l=bugtraq&m=142660345230545&w=2http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.htmlhttp://marc.info/?l=bugtraq&m=142791032306609&w=2https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380http://marc.info/?l=bugtraq&m=143290437727362&w=2http://marc.info/?l=bugtraq&m=143290522027658&w=2http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlhttps://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.aschttps://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=1127490http://secunia.com/advisories/59700http://secunia.com/advisories/58962http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmlhttp://linux.oracle.com/errata/ELSA-2014-1052.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/95165https://support.citrix.com/article/CTX216642http://secunia.com/advisories/59710http://secunia.com/advisories/59743http://secunia.com/advisories/60022http://secunia.com/advisories/60221http://secunia.com/advisories/60410http://secunia.com/advisories/60493http://secunia.com/advisories/60684http://secunia.com/advisories/60778http://secunia.com/advisories/60803http://secunia.com/advisories/61017http://secunia.com/advisories/61100http://secunia.com/advisories/61171http://secunia.com/advisories/61184http://secunia.com/advisories/61214http://secunia.com/advisories/61250http://secunia.com/advisories/61392http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15571.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2014:158http://www.securityfocus.com/bid/69075http://www.securitytracker.com/id/1030693http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240http://www-01.ibm.com/support/docview.wss?uid=swg21681752http://www-01.ibm.com/support/docview.wss?uid=swg21683389https://blogs.oracle.com/sunsecurity/entry/cve_2014_3508_information_disclosurehttps://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87https://usn.ubuntu.com/2308-1/https://nvd.nist.gov