4.3
CVSSv2

CVE-2014-3568

Published: 19/10/2014 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

OpenSSL prior to 0.9.8zc, 1.0.0 prior to 1.0.0o, and 1.0.1 prior to 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote malicious users to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 1.0.0n

openssl openssl 1.0.1

openssl openssl 1.0.0c

openssl openssl 1.0.0i

openssl openssl 1.0.0

openssl openssl 1.0.1h

openssl openssl 1.0.0m

openssl openssl 1.0.1c

openssl openssl 1.0.1g

openssl openssl 1.0.0h

openssl openssl 1.0.0e

openssl openssl 1.0.0f

openssl openssl 1.0.0d

openssl openssl 1.0.0j

openssl openssl 1.0.1a

openssl openssl 1.0.1d

openssl openssl 1.0.0k

openssl openssl

openssl openssl 1.0.1b

openssl openssl 1.0.1e

openssl openssl 1.0.1f

openssl openssl 1.0.0l

openssl openssl 1.0.0a

openssl openssl 1.0.1i

openssl openssl 1.0.0b

openssl openssl 1.0.0g

Vendor Advisories

Several vulnerabilities have been found in OpenSSL, the Secure Sockets Layer library and toolkit CVE-2014-3513 A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data A remote attacker could send multiple specially crafted handshake messages to exhaust all availabl ...
A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server (CVE-2014-3513) A memory leak flaw was found in the way an OpenSSL handled failed session ...
OpenSSL before 098zc, 100 before 100o, and 101 before 101j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 30 handshake, related to s23_clntc and s23_srvrc ...
Description of Problem A number of security vulnerabilities have been identified in firmware used in the Lights Out Management (LOM) component across all NetScaler-based hardware appliances: Citrix NetScaler Application Delivery Controller (ADC) Citrix NetScaler Gateway Citrix NetScaler Service Delivery Appliance Citrix CloudBridge (now NetScaler S ...

Recent Articles

Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
The Register • Neil McAllister in San Francisco • 15 Oct 2014

Four new patches for open-source crypto libraries

Poodle If you're using the popular OpenSSL open source cryptography library, you have more to worry about than the recently disclosed POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability, project devs have warned. In addition to patching two POODLE-related bugs, new releases of OpenSSL issued on Wednesday also close a pair of memory leaks that can allow attackers to launch denial-of-service attacks against OpenSSL-enabled servers. The most serious of these is a bug in OpenSSL's ...

References

CWE-310https://www.openssl.org/news/secadv_20141015.txthttp://www.securitytracker.com/id/1031053http://www.debian.org/security/2014/dsa-3053http://marc.info/?l=bugtraq&m=141477196830952&w=2http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.htmlhttp://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.htmlftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.aschttp://secunia.com/advisories/61207http://secunia.com/advisories/62030http://secunia.com/advisories/59627http://secunia.com/advisories/61959http://www-01.ibm.com/support/docview.wss?uid=swg21686997http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.htmlhttp://secunia.com/advisories/61819http://secunia.com/advisories/61130http://secunia.com/advisories/61058http://secunia.com/advisories/61073http://secunia.com/advisories/62070https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6http://secunia.com/advisories/62124http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlhttp://support.apple.com/HT204244http://marc.info/?l=bugtraq&m=142103967620673&w=2http://marc.info/?l=bugtraq&m=142495837901899&w=2http://marc.info/?l=bugtraq&m=142624590206005&w=2http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.htmlhttp://marc.info/?l=bugtraq&m=142791032306609&w=2http://marc.info/?l=bugtraq&m=142804214608580&w=2http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlhttps://support.apple.com/HT205217https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380http://marc.info/?l=bugtraq&m=143290437727362&w=2http://marc.info/?l=bugtraq&m=143290522027658&w=2http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlhttps://kc.mcafee.com/corporate/index?page=content&id=SB10091https://exchange.xforce.ibmcloud.com/vulnerabilities/97037https://support.citrix.com/article/CTX216642http://security.gentoo.org/glsa/glsa-201412-39.xmlhttp://www.securityfocus.com/bid/70585https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=26a59d9b46574e457870197dffa802871b4c8fc7https://nvd.nist.govhttps://www.debian.org/security/./dsa-3053https://access.redhat.com/security/cve/cve-2014-3568