CVE-2014-3568CVE-2014-3568

Affected configuration(s):

cpe:/a:openssl:openssl:0.9.8zb
cpe:/a:openssl:openssl:1.0.0
cpe:/a:openssl:openssl:1.0.0:beta1
cpe:/a:openssl:openssl:1.0.0:beta2
cpe:/a:openssl:openssl:1.0.0:beta3
cpe:/a:openssl:openssl:1.0.0:beta4
cpe:/a:openssl:openssl:1.0.0:beta5
cpe:/a:openssl:openssl:1.0.0a
cpe:/a:openssl:openssl:1.0.0b
cpe:/a:openssl:openssl:1.0.0c
cpe:/a:openssl:openssl:1.0.0d
cpe:/a:openssl:openssl:1.0.0e
cpe:/a:openssl:openssl:1.0.0f
cpe:/a:openssl:openssl:1.0.0g
cpe:/a:openssl:openssl:1.0.0h
cpe:/a:openssl:openssl:1.0.0i
cpe:/a:openssl:openssl:1.0.0j
cpe:/a:openssl:openssl:1.0.0k
cpe:/a:openssl:openssl:1.0.0l
cpe:/a:openssl:openssl:1.0.0m
cpe:/a:openssl:openssl:1.0.0n
cpe:/a:openssl:openssl:1.0.1
cpe:/a:openssl:openssl:1.0.1:beta1
cpe:/a:openssl:openssl:1.0.1:beta2
cpe:/a:openssl:openssl:1.0.1:beta3
cpe:/a:openssl:openssl:1.0.1a
cpe:/a:openssl:openssl:1.0.1b
cpe:/a:openssl:openssl:1.0.1c
cpe:/a:openssl:openssl:1.0.1d
cpe:/a:openssl:openssl:1.0.1e
cpe:/a:openssl:openssl:1.0.1f
cpe:/a:openssl:openssl:1.0.1g
cpe:/a:openssl:openssl:1.0.1h
cpe:/a:openssl:openssl:1.0.1i

Date published: 2014-10-18T21:55:13.980-04:00

Date last modified: 2017-11-14T21:29:04.987-05:00

CVSS Score: 4.3

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc

Summary: OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.