Information Exposure Affecting openssl package, versions >=1.0.0, <1.0.109
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
46.96% (98th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-COCOAPODS-OPENSSL-471180
- published 2 Oct 2019
- disclosed 14 May 2014
- credit Unknown
Introduced: 14 May 2014
CVE-2014-3508 Open this link in a new tabHow to fix?
Upgrade OpenSSL
to version 1.0.109 or higher.
Overview
OpenSSL is a SSL/TLS and Crypto toolkit. Deprecated in Mac OS and gone in iOS, this spec gives your project non-deprecated OpenSSL support.
Affected versions of this package are vulnerable to Information Exposure. OpenSSL is vulnerable to information disclosure. When pretty printing through the OBJ_obj2txt function in crypto/objects/obj_dat.c is it possible for attackers to read from the process stack memory. This is caused because OpenSSL does not ensure the presence of \0
characters.
References
- Debian Security Advisory
- Fedora Security Announcement
- Fedora Security Announcement
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
- HPE Support Center Security Bulletin
- HPE Support Center Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
- http://linux.oracle.com/errata/ELSA-2014-1052.html
- http://linux.oracle.com/errata/ELSA-2014-1053.html
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_3508_information_disclosure
- https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
- https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
- https://support.citrix.com/article/CTX216642
- http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15571.html
- https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
- https://www.openssl.org/news/secadv_20140806.txt
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
- http://www.tenable.com/security/tns-2014-06
- IBM Security Bulletin
- IBM Security Bulletin
- IBM Security Bulletin
- IBM Security Bulletin
- IBM Security Bulletin
- OpenSuse Security Announcement
- OpenSuse Security Announcement
- OpenSuse Security Update
- RedHat Bugzilla Bug
- RedHat Security Advisory
- RedHat Security Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Security Focus
- Security Tracker
- X-force Vulnerability Report