Unrated severityNVD Advisory· Published Aug 13, 2014· Updated May 6, 2026
CVE-2014-5139
CVE-2014-5139
Description
The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
Affected products
14cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*+ 11 more
- cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
- osv-coords2 versionspkg:rpm/opensuse/libressl&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/openssl-1_1&distro=openSUSE%20Tumbleweed
< 2.5.0-1.1+ 1 more
- (no CPE)range: < 2.5.0-1.1
- (no CPE)range: < 1.1.1l-1.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
47- www.openssl.org/news/secadv_20140806.txtnvdVendor Advisory
- ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.ascnvd
- aix.software.ibm.com/aix/efixes/security/openssl_advisory10.ascnvd
- lists.opensuse.org/opensuse-updates/2014-08/msg00036.htmlnvd
- marc.infonvd
- marc.infonvd
- marc.infonvd
- marc.infonvd
- marc.infonvd
- marc.infonvd
- marc.infonvd
- marc.infonvd
- marc.infonvd
- marc.infonvd
- marc.infonvd
- secunia.com/advisories/59700nvd
- secunia.com/advisories/59710nvd
- secunia.com/advisories/59756nvd
- secunia.com/advisories/60022nvd
- secunia.com/advisories/60221nvd
- secunia.com/advisories/60493nvd
- secunia.com/advisories/60803nvd
- secunia.com/advisories/60810nvd
- secunia.com/advisories/60917nvd
- secunia.com/advisories/60921nvd
- secunia.com/advisories/61017nvd
- secunia.com/advisories/61100nvd
- secunia.com/advisories/61171nvd
- secunia.com/advisories/61184nvd
- secunia.com/advisories/61392nvd
- secunia.com/advisories/61775nvd
- secunia.com/advisories/61959nvd
- security.gentoo.org/glsa/glsa-201412-39.xmlnvd
- support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.htmlnvd
- www-01.ibm.com/support/docview.wssnvd
- www-01.ibm.com/support/docview.wssnvd
- www-01.ibm.com/support/docview.wssnvd
- www-01.ibm.com/support/docview.wssnvd
- www.debian.org/security/2014/dsa-2998nvd
- www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htmnvd
- www.securityfocus.com/bid/69077nvd
- www.securitytracker.com/id/1030693nvd
- www.tenable.com/security/tns-2014-06nvd
- git.openssl.org/gitweb/nvd
- git.openssl.org/gitweb/nvd
- lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.htmlnvd
- www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.ascnvd
News mentions
0No linked articles in our index yet.