Advisory ID

11581

Release date

2015-07-06

Last Updated

2015-07-06

Issue Severity

N/A

Source

Source

US-CERT/NIST

Release date

2015-06-12

CVSS v2 Base Score

7.5 (HIGH)

Problem Description

The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.

Find more about CVE-2014-8176 from MITRE CVE directory and NIST NVD

Impact

if a DTLS peer receives application data between the ChangeCipherSpec and finished messages, buffering of such a data may cause an invalid free, resulting in a segmentation fault or potentially, memory corruption.

Affected Products

No FoxT product is affected by this vulnerability



Workaround

N/A

Obtaining Fixed Software

N/A



External References

OpenSSL Security Advisory








Still have questions? We can help. Submit a case to Technical Support.

Last Modified On: May 25, 2018