Unrated severityNVD Advisory· Published May 6, 2014· Updated May 6, 2026
CVE-2014-0198
CVE-2014-0198
Description
The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
Affected products
13cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
112- www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlnvdPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- advisories.mageia.org/MGASA-2014-0204.htmlnvdThird Party Advisory
- aix.software.ibm.com/aix/efixes/security/openssl_advisory9.ascnvdThird Party Advisory
- kb.juniper.net/InfoCenter/indexnvdThird Party Advisory
- kb.juniper.net/InfoCenter/indexnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2014-05/msg00036.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2014-05/msg00037.htmlnvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- puppetlabs.com/security/cve/cve-2014-0198nvdThird Party Advisory
- seclists.org/fulldisclosure/2014/Dec/23nvdMailing ListThird Party Advisory
- security.gentoo.org/glsa/glsa-201407-05.xmlnvdThird Party Advisory
- support.citrix.com/article/CTX140876nvdThird Party Advisory
- support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.htmlnvdThird Party Advisory
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-opensslnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www.blackberry.com/btsc/KB36051nvdThird Party Advisory
- www.debian.org/security/2014/dsa-2931nvdThird Party Advisory
- www.fortiguard.com/advisory/FG-IR-14-018/nvdThird Party Advisory
- www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htmnvdThird Party Advisory
- www.ibm.com/support/docview.wssnvdThird Party Advisory
- www.ibm.com/support/docview.wssnvdThird Party Advisory
- www.openbsd.org/errata55.htmlnvdThird Party Advisory
- www.openssl.org/news/secadv_20140605.txtnvdVendor Advisory
- www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlnvdThird Party Advisory
- www.securityfocus.com/archive/1/534161/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/67193nvdThird Party AdvisoryVDB Entry
- www.vmware.com/security/advisories/VMSA-2014-0006.htmlnvdThird Party Advisory
- www.vmware.com/security/advisories/VMSA-2014-0012.htmlnvdThird Party Advisory
- cert-portal.siemens.com/productcert/pdf/ssa-234763.pdfnvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- www.novell.com/support/kb/doc.phpnvdThird Party Advisory
- secunia.com/advisories/58337nvdNot Applicable
- secunia.com/advisories/58667nvdNot Applicable
- secunia.com/advisories/58713nvdNot Applicable
- secunia.com/advisories/58714nvdNot Applicable
- secunia.com/advisories/58939nvdNot Applicable
- secunia.com/advisories/58945nvdNot Applicable
- secunia.com/advisories/58977nvdNot Applicable
- secunia.com/advisories/59126nvdNot Applicable
- secunia.com/advisories/59162nvdNot Applicable
- secunia.com/advisories/59163nvdNot Applicable
- secunia.com/advisories/59190nvdNot Applicable
- secunia.com/advisories/59202nvdNot Applicable
- secunia.com/advisories/59264nvdNot Applicable
- secunia.com/advisories/59282nvdNot Applicable
- secunia.com/advisories/59284nvdNot Applicable
- secunia.com/advisories/59287nvdNot Applicable
- secunia.com/advisories/59300nvdNot Applicable
- secunia.com/advisories/59301nvdNot Applicable
- secunia.com/advisories/59306nvdNot Applicable
- secunia.com/advisories/59310nvdNot Applicable
- secunia.com/advisories/59342nvdNot Applicable
- secunia.com/advisories/59374nvdNot Applicable
- secunia.com/advisories/59398nvdNot Applicable
- secunia.com/advisories/59413nvdNot Applicable
- secunia.com/advisories/59437nvdNot Applicable
- secunia.com/advisories/59438nvdNot Applicable
- secunia.com/advisories/59440nvdNot Applicable
- secunia.com/advisories/59449nvdNot Applicable
- secunia.com/advisories/59450nvdNot Applicable
- secunia.com/advisories/59490nvdNot Applicable
- secunia.com/advisories/59491nvdNot Applicable
- secunia.com/advisories/59514nvdNot Applicable
- secunia.com/advisories/59525nvdNot Applicable
- secunia.com/advisories/59529nvdNot Applicable
- secunia.com/advisories/59655nvdNot Applicable
- secunia.com/advisories/59666nvdNot Applicable
- secunia.com/advisories/59669nvdNot Applicable
- secunia.com/advisories/59721nvdNot Applicable
- secunia.com/advisories/59784nvdNot Applicable
- secunia.com/advisories/59990nvdNot Applicable
- secunia.com/advisories/60049nvdNot Applicable
- secunia.com/advisories/60066nvdNot Applicable
- secunia.com/advisories/60571nvdNot Applicable
- secunia.com/advisories/61254nvdNot Applicable
- www-01.ibm.com/support/docview.wssnvdBroken Link
- www-01.ibm.com/support/docview.wssnvdBroken Link
- www-01.ibm.com/support/docview.wssnvdBroken Link
- www-01.ibm.com/support/docview.wssnvdBroken Link
- www-01.ibm.com/support/docview.wssnvdBroken Link
- www-947.ibm.com/support/entry/portal/docdisplaynvdBroken Link
- www-947.ibm.com/support/entry/portal/docdisplaynvdBroken Link
- www-947.ibm.com/support/entry/portal/docdisplaynvdBroken Link
- www-947.ibm.com/support/entry/portal/docdisplaynvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- kb.bluecoat.com/indexnvdBroken Link
- kc.mcafee.com/corporate/indexnvdBroken Link
- rt.openssl.org/Ticket/Display.htmlnvdBroken Link
News mentions
0No linked articles in our index yet.