pazhanivel07 / OpenSSL_1_0_1g_AfterPatch

Other
0 stars 0 forks source link

CVE-2014-0198 (Low) detected in opensslOpenSSL_1_0_1g - autoclosed #11

Closed mend-bolt-for-github[bot] closed 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2014-0198 - Low Severity Vulnerability

Vulnerable Library - opensslOpenSSL_1_0_1g

TLS/SSL and crypto library

Library home page: https://github.com/openssl/openssl.git

Found in HEAD commit: 3fbbb063388e28edaf82a166f24d4ce71e0b1514

Found in base branch: master

Vulnerable Source Files (2)

/ssl/s3_pkt.c /ssl/s3_pkt.c

Vulnerability Details

The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.

Publish Date: 2014-05-06

URL: CVE-2014-0198

CVSS 3 Score Details (3.7)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2014-0198

Release Date: 2014-05-06

Fix Resolution: openssl.redist - 1.0.1.25


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 1 year ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.