Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-0195

Publication date 5 June 2014

Last updated 24 July 2024


Ubuntu priority

The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.

Read the notes from the security team

Status

Package Ubuntu Release Status
openssl 14.04 LTS trusty
Fixed 1.0.1f-1ubuntu2.2
13.10 saucy
Fixed 1.0.1e-3ubuntu1.4
12.04 LTS precise
Fixed 1.0.1-4ubuntu5.14
10.04 LTS lucid
Not affected
openssl098 14.04 LTS trusty
Fixed 0.9.8o-7ubuntu3.2.14.04.1
13.10 saucy
Fixed 0.9.8o-7ubuntu3.2.13.10.1
12.04 LTS precise
Fixed 0.9.8o-7ubuntu3.2
10.04 LTS lucid Not in release

Notes


mdeslaur

code in lucid is different, doesn't look vulnerable as it just discards multiple fragments. See: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=c713a4c04d096fca04c42a95dddec235d9390136 and http://rt.openssl.org/Ticket/Display.html?id=2230

References

Related Ubuntu Security Notices (USN)

Other references