OpenSSL CVE-2014-0195 Buffer Overflow Vulnerability

description-logoDescription

A buffer overrun attack can be triggered by sending invalid DTLS fragmentsto an OpenSSL DTLS client or server. This is potentially exploitable torun arbitrary code on a vulnerable client or server.Only applications using OpenSSL as a DTLS client or server affected.OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8zaOpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m.OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h.Thanks to Jri Aedla for reporting this issue. This issue wasreported to OpenSSL on 23rd April 2014 via HP ZDI.The fix was developed by Stephen Henson of the OpenSSL core team.

affected-products-logoAffected Applications

OpenSSL

CVE References

CVE-2014-0195