CVE-2014-3569

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling.  NOTE: this issue became relevant after the CVE-2014-3568 fix.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
opensslopenssl
1.0.1j:j
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
disco
Fixed 1.0.1f-1ubuntu10
released
cosmic
Fixed 1.0.1f-1ubuntu10
released
bionic
Fixed 1.0.1f-1ubuntu10
released
artful
Fixed 1.0.1f-1ubuntu10
released
zesty
Fixed 1.0.1f-1ubuntu10
released
yakkety
Fixed 1.0.1f-1ubuntu10
released
xenial
Fixed 1.0.1f-1ubuntu10
released
wily
Fixed 1.0.1f-1ubuntu10
released
vivid
Fixed 1.0.1f-1ubuntu10
released
utopic
Fixed 1.0.1f-1ubuntu9.1
released
trusty
Fixed 1.0.1f-1ubuntu2.8
released
precise
Fixed 1.0.1-4ubuntu5.21
released
lucid
Fixed 0.9.8k-7ubuntu8.23
released
openssl098
disco
dne
cosmic
dne
bionic
dne
artful
dne
zesty
dne
yakkety
dne
xenial
dne
wily
dne
vivid
ignored
utopic
ignored
trusty
dne
precise
ignored
lucid
dne
References