Race Condition Affecting openssl package, versions >=1.0.0, <1.0.109


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
2.18% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Race Condition vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-COCOAPODS-OPENSSL-470916
  • published2 Oct 2019
  • disclosed14 May 2014
  • creditUnknown

Introduced: 14 May 2014

CVE-2014-3509  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade OpenSSL to version 1.0.109 or higher.

Overview

OpenSSL is a SSL/TLS and Crypto toolkit. Deprecated in Mac OS and gone in iOS, this spec gives your project non-deprecated OpenSSL support.

Affected versions of this package are vulnerable to Race Condition. OepnSSL is vulnerable to denial of service (DoS) attacks through memory overwrite and client application crash. If a multithreaded client connects to a malicious server using a resumed session, it is possible to trigger a race condition in the ssl_parse_serverhello_tlsext function which allows an attacker to write up to 255 bytes of freed memory.

References

CVSS Scores

version 3.1