Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-3569

EPSS 7.56% · P92
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-3569

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenSSL‘ssl23_get_client_hello()’函数拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenSSL是OpenSSL团队开发的一个开源的能够实现安全套接层(SSL v2/v3)和安全传输层(TLS v1)协议的通用加密库,它支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL 1.0.1j版本的s23_srvr.c文件中的‘ssl23_get_client_hello’函数存在安全漏洞,该漏洞源于程序没有正确处理使用非支持的协议。远程攻击者可借助特制的握手利用该漏洞造成拒绝服务(空指针逆向引用和守护进程崩溃)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-3569

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-3569

登录查看更多情报信息。

Same Patch Batch · n/a · 2014-12-24 · 31 CVEs total

CVE-2014-6132IBM WebSphere Service Registry and Repository Web UI 跨站脚本漏洞
CVE-2014-7999多款Cisco-Meraki设备权限许可和访问控制漏洞
CVE-2014-7995多款Cisco-Meraki设备权限许可和访问控制漏洞
CVE-2014-7994多款Cisco-Meraki设备输入验证漏洞
CVE-2014-7993多款Cisco-Meraki设备信息泄露漏洞
CVE-2014-6188IBM WebSphere Service Registry and Repository 跨站脚本漏洞
CVE-2014-6187IBM WebSphere Service Registry and Repository 跨站请求伪造漏洞
CVE-2014-6186IBM WebSphere Service Registry and Repository 权限许可和访问控制漏洞
CVE-2014-6181IBM WebSphere Service Registry and Repository 权限许可和访问控制漏洞
CVE-2014-6180IBM WebSphere Service Registry and Repository Web UI 跨站脚本漏洞
CVE-2014-6179IBM WebSphere Service Registry and Repository Web UI 跨站脚本漏洞
CVE-2014-6178IBM WebSphere Service Registry and Repository widgets 跨站脚本漏洞
CVE-2014-6177IBM WebSphere Service Registry and Repository 安全漏洞
CVE-2014-6155IBM WebSphere Service Registry and Repository 目录遍历漏洞
CVE-2014-6153IBM WebSphere Service Registry and Repository Web UI 安全漏洞
CVE-2004-2771Heirloom mailx和BSD mailx 输入验证错误漏洞
CVE-2014-4322QSEECOM driver for the Linux kernel 安全漏洞
CVE-2014-9418Huawei eSpace Desktop eSpace Meeting ActiveX控件缓冲区溢出漏洞
CVE-2014-9417Huawei eSpace Desktop Meeting组件输入验证漏洞
CVE-2014-9416Huawei eSpace Desktop 不可信搜索路径漏洞

Showing top 20 of 31 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2014-3569

No comments yet


Leave a comment