OpenSSL SRP Remote Denial of Service Vulnerability (CVE-2014-3512)
Release date:
Updated on:
Affected Systems:
OpenSSL Project OpenSSL <1.0.1i
Description:
--------------------------------------------------------------------------------
Bugtraq id: 69083
CVE (CAN) ID: CVE-2014-3512
OpenSSL is an open-source SSL implementation that implements high-strength encryption for network communication. It is widely used in various network applications.
An internal buffer overflow occurs when an invalid SRP parameter is sent by a malicious OpenSSL Client or server. A denial of service vulnerability exists in implementation. Attackers can exploit this vulnerability to cause a denial of service attack. Only applications configured for SRP are affected.
<* Source: Sean Devlin
Watson Ladd
Link: http://www.openssl.org/news/secadv_20140806.txt
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
OpenSSL Project
---------------
OpenSSL projecthas published a Security Bulletin Board (secadv_20140806.txt) and corresponding patches for this purpose:
Secadv_20140806.txt: OpenSSL Security Advisory [6 Aug 2014]
Link: http://www.openssl.org/news/secadv_20140806.txt
Severe OpenSSL bug allows attackers to read 64 KB of memory, fixed in half an hour in Debian
OpenSSL "heartbleed" Security Vulnerability
Provides FTP + SSL/TLS authentication through OpenSSL and implements secure data transmission.
OpenSSL details: click here
OpenSSL: click here
This article permanently updates the link address: