CVE-2014-3470

CVSS V2 Medium 4.3 CVSS V3 None
Description
The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
Overview
  • CVE ID
  • CVE-2014-3470
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2014-06-05T21:55:07
  • Last Modified Date
  • 2022-09-16T19:54:02
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1 OR 0.9.8za
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1 OR 1.0.0 1.0.0m
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1 OR 1.0.1 1.0.1h
cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* 1 OR 10.0.0 10.0.13
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
http://www.openssl.org/news/secadv_20140605.txt Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1103600
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8011cd56e39a433b1837465259a9bd24a38727fb Patch
http://www.securityfocus.com/bid/67898
http://secunia.com/advisories/58797
http://secunia.com/advisories/59191
http://secunia.com/advisories/58579
https://kb.bluecoat.com/index?page=content&id=SA80
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
http://www.blackberry.com/btsc/KB36051
http://www-01.ibm.com/support/docview.wss?uid=swg21676035
http://secunia.com/advisories/59438
http://secunia.com/advisories/59301
http://secunia.com/advisories/59450
http://secunia.com/advisories/59491
http://secunia.com/advisories/59721
http://www-01.ibm.com/support/docview.wss?uid=swg21677695
http://secunia.com/advisories/59655
http://secunia.com/advisories/59659
http://secunia.com/advisories/59162
http://secunia.com/advisories/59120
http://www-01.ibm.com/support/docview.wss?uid=swg21676655
http://www-01.ibm.com/support/docview.wss?uid=swg21678289
http://secunia.com/advisories/58939
http://secunia.com/advisories/59666
http://secunia.com/advisories/59126
http://www-01.ibm.com/support/docview.wss?uid=swg21677828
http://www-01.ibm.com/support/docview.wss?uid=swg21676062
http://secunia.com/advisories/59490
https://kc.mcafee.com/corporate/index?page=content&id=SB10075
http://www-01.ibm.com/support/docview.wss?uid=swg21676496
http://www-01.ibm.com/support/docview.wss?uid=swg21676419
http://www-01.ibm.com/support/docview.wss?uid=swg21678167
http://secunia.com/advisories/59442
http://www.novell.com/support/kb/doc.php?id=7015300
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E
http://www-01.ibm.com/support/docview.wss?uid=swg21673137
http://secunia.com/advisories/59514
http://www-01.ibm.com/support/docview.wss?uid=swg21677527
http://secunia.com/advisories/59495
http://secunia.com/advisories/59669
http://secunia.com/advisories/59413
http://www.novell.com/support/kb/doc.php?id=7015264
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E
http://www-01.ibm.com/support/docview.wss?uid=swg24037761
http://secunia.com/advisories/59300
http://www.splunk.com/view/SP-CAAAM2D
http://secunia.com/advisories/59895
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://secunia.com/advisories/59459
http://secunia.com/advisories/59451
http://www-01.ibm.com/support/docview.wss?uid=isg400001843
http://secunia.com/advisories/59342
http://www-01.ibm.com/support/docview.wss?uid=isg400001841
http://secunia.com/advisories/59916
http://secunia.com/advisories/59990
http://secunia.com/advisories/60571
http://secunia.com/advisories/59784
http://support.apple.com/kb/HT6443
http://seclists.org/fulldisclosure/2014/Dec/23
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
http://marc.info/?l=bugtraq&m=140431828824371&w=2
http://marc.info/?l=bugtraq&m=140499827729550&w=2
http://marc.info/?l=bugtraq&m=140266410314613&w=2
http://marc.info/?l=bugtraq&m=140448122410568&w=2
http://marc.info/?l=bugtraq&m=140491231331543&w=2
http://marc.info/?l=bugtraq&m=140621259019789&w=2
http://marc.info/?l=bugtraq&m=140482916501310&w=2
http://marc.info/?l=bugtraq&m=140389274407904&w=2
http://marc.info/?l=bugtraq&m=140317760000786&w=2
http://marc.info/?l=bugtraq&m=140904544427729&w=2
http://marc.info/?l=bugtraq&m=140389355508263&w=2
http://marc.info/?l=bugtraq&m=140752315422991&w=2
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
https://www.novell.com/support/kb/doc.php?id=7015271
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
http://www-01.ibm.com/support/docview.wss?uid=swg21683332
http://www-01.ibm.com/support/docview.wss?uid=swg21677836
http://www-01.ibm.com/support/docview.wss?uid=swg21676889
http://www-01.ibm.com/support/docview.wss?uid=swg21676879
http://www-01.ibm.com/support/docview.wss?uid=swg21676615
http://www-01.ibm.com/support/docview.wss?uid=swg21676529
http://www-01.ibm.com/support/docview.wss?uid=swg21676501
http://www-01.ibm.com/support/docview.wss?uid=swg21676071
http://www-01.ibm.com/support/docview.wss?uid=swg21675821
http://www-01.ibm.com/support/docview.wss?uid=swg21675626
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
http://www.vmware.com/security/advisories/VMSA-2014-0006.html
http://www.mandriva.com/security/advisories?name=MDVSA-2014:106
http://www.mandriva.com/security/advisories?name=MDVSA-2014:105
http://www.ibm.com/support/docview.wss?uid=swg24037783
http://www.ibm.com/support/docview.wss?uid=swg21676793
http://www.ibm.com/support/docview.wss?uid=swg21676356
http://www.f-secure.com/en/web/labs_global/fsc-2014-6
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15342.html
http://support.citrix.com/article/CTX140876
http://security.gentoo.org/glsa/glsa-201407-05.xml
http://secunia.com/advisories/61254
http://secunia.com/advisories/59525
http://secunia.com/advisories/59518
http://secunia.com/advisories/59483
http://secunia.com/advisories/59460
http://secunia.com/advisories/59449
http://secunia.com/advisories/59445
http://secunia.com/advisories/59441
http://secunia.com/advisories/59440
http://secunia.com/advisories/59437
http://secunia.com/advisories/59431
http://secunia.com/advisories/59365
http://secunia.com/advisories/59364
http://secunia.com/advisories/59362
http://secunia.com/advisories/59340
http://secunia.com/advisories/59310
http://secunia.com/advisories/59306
http://secunia.com/advisories/59287
http://secunia.com/advisories/59284
http://secunia.com/advisories/59282
http://secunia.com/advisories/59264
http://secunia.com/advisories/59223
http://secunia.com/advisories/59192
http://secunia.com/advisories/59189
http://secunia.com/advisories/59175
http://secunia.com/advisories/59167
http://secunia.com/advisories/58977
http://secunia.com/advisories/58945
http://secunia.com/advisories/58742
http://secunia.com/advisories/58716
http://secunia.com/advisories/58714
http://secunia.com/advisories/58713
http://secunia.com/advisories/58667
http://secunia.com/advisories/58615
http://secunia.com/advisories/58337
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
History
Created Old Value New Value Data Type Notes
2022-05-10 17:43:11 Added to TrackCVE
2022-12-01 23:24:07 2014-06-05T21:55Z 2014-06-05T21:55:07 CVE Published Date updated
2022-12-01 23:24:07 2022-09-16T19:54:02 CVE Modified Date updated
2022-12-01 23:24:07 Analyzed Vulnerability Status updated