CVE-2014-0221
The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.8210 (82.1%)
Percentil: 99.2%
EPSS: 2026-05-06
Afecta
openssl:opensslredhat:storagefedoraproject:fedoraredhat:enterprise_linuxmariadb:mariadbopensuse:leapopensuse:opensusesuse:linux_enterprise_desktopsuse:linux_enterprise_serversuse:linux_enterprise_software_development_kitsuse:linux_enterprise_workstation_extensionDescripción técnica
The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
Publicada: 5/6/2014, 21:55:06
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://linux.oracle.com/errata/ELSA-2014-1053.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=140266410314613&w=2