CVE-2014-0224

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.4 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
opensslopenssl
𝑥
< 0.9.8za
opensslopenssl
1.0.0 ≤
𝑥
< 1.0.0m
opensslopenssl
1.0.1 ≤
𝑥
< 1.0.1h
redhatjboss_enterprise_application_platform
5.2.0
redhatjboss_enterprise_application_platform
6.2.3
redhatjboss_enterprise_web_platform
5.2.0
redhatjboss_enterprise_web_server
2.0.1
redhatstorage
2.1
opensuseopensuse
13.1
opensuseopensuse
13.2
redhatenterprise_linux
6.0
filezilla-projectfilezilla_server
𝑥
< 0.9.45
siemensapplication_processing_engine_firmware
𝑥
< 2.0.2
siemenscp1543-1_firmware
𝑥
< 1.1.25
siemenss7-1500_firmware
𝑥
< 1.6
siemensrox_firmware
𝑥
< 1.16.1
mariadbmariadb
10.0.0 ≤
𝑥
< 10.0.13
pythonpython
2.7.0 ≤
𝑥
< 2.7.8
pythonpython
3.4.0 ≤
𝑥
< 3.4.2
nodejsnode.js
𝑥
< 0.10.29
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
trusty
Fixed 1.0.1f-1ubuntu2.2
released
saucy
Fixed 1.0.1e-3ubuntu1.4
released
precise
Fixed 1.0.1-4ubuntu5.14
released
lucid
Fixed 0.9.8k-7ubuntu8.18
released
openssl098
trusty
Fixed 0.9.8o-7ubuntu3.2.14.04.1
released
saucy
Fixed 0.9.8o-7ubuntu3.2.13.10.1
released
precise
Fixed 0.9.8o-7ubuntu3.2
released
lucid
dne
References