Skip to content

CVE-2014-0195

The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.

Ver en NVD

Severidad

N/A

EPSS

Probabilidad de explotación (próx. 30 días): 0.9275 (92.8%)
Percentil: 99.8%
EPSS: 2026-05-06

Afecta

openssl:opensslmariadb:mariadbopensuse:leapopensuse:opensusefedoraproject:fedora

Descripción técnica

The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.

Publicada: 5/6/2014, 21:55:06
Última modificación: 6/5/2026, 22:30:45

Referencias

InicioEventosBlogRecursosEquipo