CVE-2014-3512
Published: 7 August 2014
Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.
Priority
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
|
precise |
Released
(1.0.1-4ubuntu5.17)
|
|
trusty |
Released
(1.0.1f-1ubuntu2.5)
|
|
upstream |
Released
(1.0.1i)
|
|
Patches: upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=966fe81f9befbff62522a158006fb03050a868df upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d15d17bb6487a3e7b59a22882b6a22300fe5111d |
||
openssl098 Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Not vulnerable
|
|
trusty |
Does not exist
(trusty was not-affected)
|
|
upstream |
Not vulnerable
|