4.3
CVSSv2

CVE-2014-3511

Published: 13/08/2014 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 prior to 1.0.1i allows man-in-the-middle malicious users to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 1.0.1

openssl openssl 1.0.0c

openssl openssl 1.0.0i

openssl openssl 1.0.0

openssl openssl 1.0.1h

openssl openssl 1.0.0m

openssl openssl 1.0.1c

openssl openssl 1.0.1g

openssl openssl 1.0.0h

openssl openssl 1.0.0e

openssl openssl 1.0.0f

openssl openssl 1.0.0d

openssl openssl 1.0.0j

openssl openssl 1.0.1a

openssl openssl 1.0.1d

openssl openssl 1.0.0k

openssl openssl 1.0.1b

openssl openssl 1.0.1e

openssl openssl 1.0.1f

openssl openssl 1.0.0l

openssl openssl 1.0.0a

openssl openssl 1.0.0b

openssl openssl 1.0.0g

Vendor Advisories

Synopsis Critical: rhev-hypervisor6 security update Type/Severity Security Advisory: Critical Topic An updated rhev-hypervisor6 package that fixes multiple security issues isnow available for Red Hat Enterprise Virtualization 3Red Hat Product Security has rated this update as having Critical securityimpac ...
Several security issues were fixed in OpenSSL ...
Multiple vulnerabilities have been identified in OpenSSL, a Secure Sockets Layer toolkit, that may result in denial of service (application crash, large memory consumption), information leak, protocol downgrade Additionally, a buffer overrun affecting only applications explicitly set up for SRP has been fixed (CVE-2014-3512) Detailed descriptions ...
A flaw was discovered in the way OpenSSL handled DTLS packets A remote attacker could use this flaw to cause a DTLS server or client using OpenSSL to crash or use excessive amounts of memory Multiple buffer overflows in crypto/srp/srp_libc in the SRP implementation in OpenSSL 101 before 101i allow remote attackers to cause a denial of servi ...
Tenable's SecurityCenter is affected by at least one vulnerability due to the use of a third-party library, specifically OpenSSL SecurityCenter's use of OpenSSL made it vulnerable to CVE-2014-3511, an issue with the ssl23_get_client_hello function in s23_srvrc that could allow a remote, man-in-the-middle attacker to force the use of TLS 10 by t ...
Description of Problem A number of security vulnerabilities have been identified in firmware used in the Lights Out Management (LOM) component across all NetScaler-based hardware appliances: Citrix NetScaler Application Delivery Controller (ADC) Citrix NetScaler Gateway Citrix NetScaler Service Delivery Appliance Citrix CloudBridge (now NetScaler S ...

Github Repositories

ahrf - [a]scii (or [a]wk) [h]uman [r]eadable [f]ile

ahrf - [a]scii (or [a]wk) [h]uman [r]eadable [f]ile ahrf is an awk script designed to interpret a simple and straightforward ASCII file format I wrote it to share my personal documentation, which is written in plain text files They can be exported to HTML The main goal was readability One requirement: awk Supporting many awk variants (nawk, mawk, gawk or OpenBSD awk) (c

References

NVD-CWE-noinfohttps://www.openssl.org/news/secadv_20140806.txthttp://www.arubanetworks.com/support/alerts/aid-08182014.txthttp://www.tenable.com/security/tns-2014-06http://secunia.com/advisories/60810http://secunia.com/advisories/59887http://secunia.com/advisories/60377https://kc.mcafee.com/corporate/index?page=content&id=SB10084http://secunia.com/advisories/60917ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.aschttp://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.aschttp://secunia.com/advisories/60938http://secunia.com/advisories/60921http://secunia.com/advisories/60890http://www.splunk.com/view/SP-CAAANHShttp://lists.opensuse.org/opensuse-updates/2014-08/msg00036.htmlhttp://www.debian.org/security/2014/dsa-2998http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htmhttp://secunia.com/advisories/61775http://secunia.com/advisories/61959http://www-01.ibm.com/support/docview.wss?uid=swg21686997http://www-01.ibm.com/support/docview.wss?uid=swg21682293http://secunia.com/advisories/59756http://security.gentoo.org/glsa/glsa-201412-39.xmlhttp://rhn.redhat.com/errata/RHSA-2015-0197.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0126.htmlhttp://marc.info/?l=bugtraq&m=142350350616251&w=2http://marc.info/?l=bugtraq&m=142624590206005&w=2http://marc.info/?l=bugtraq&m=142660345230545&w=2http://marc.info/?l=bugtraq&m=142791032306609&w=2https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380http://marc.info/?l=bugtraq&m=143290437727362&w=2http://marc.info/?l=bugtraq&m=143290522027658&w=2https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.aschttps://techzone.ergon.ch/CVE-2014-3511https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/95162https://support.citrix.com/article/CTX216642http://linux.oracle.com/errata/ELSA-2014-1052.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlhttp://secunia.com/advisories/58962http://secunia.com/advisories/59700http://secunia.com/advisories/59710http://secunia.com/advisories/60022http://secunia.com/advisories/60221http://secunia.com/advisories/60493http://secunia.com/advisories/60684http://secunia.com/advisories/60803http://secunia.com/advisories/61017http://secunia.com/advisories/61043http://secunia.com/advisories/61100http://secunia.com/advisories/61139http://secunia.com/advisories/61184http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.htmlhttp://www.securityfocus.com/bid/69079http://www.securitytracker.com/id/1030693http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240http://www-01.ibm.com/support/docview.wss?uid=swg21683389https://bugzilla.redhat.com/show_bug.cgi?id=1127504http://marc.info/?l=bugtraq&m=142495837901899&w=2https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=280b1f1ad12131defcd986676a8fc9717aaa601bhttps://access.redhat.com/errata/RHSA-2015:0126https://usn.ubuntu.com/2308-1/https://nvd.nist.gov