CVE-2014-3470

The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
opensslopenssl
𝑥
< 0.9.8za
opensslopenssl
1.0.0 ≤
𝑥
< 1.0.0m
opensslopenssl
1.0.1 ≤
𝑥
< 1.0.1h
redhatstorage
2.1
fedoraprojectfedora
*
redhatenterprise_linux
6.0
mariadbmariadb
10.0.0 ≤
𝑥
< 10.0.13
opensuseleap
42.1
opensuseopensuse
13.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
trusty
Fixed 1.0.1f-1ubuntu2.2
released
saucy
Fixed 1.0.1e-3ubuntu1.4
released
precise
Fixed 1.0.1-4ubuntu5.14
released
lucid
not-affected
openssl098
trusty
dne
saucy
not-affected
precise
not-affected
lucid
dne
References