NULL Pointer Dereference Affecting openssl package, versions [1.0.1,1.0.1k)[1.0.0,1.0.0p)[,0.9.8zd)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
44.28% (98th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-OPENSSL-2318644
  • published14 Dec 2021
  • disclosed9 Jan 2015
  • creditUnknown

Introduced: 9 Jan 2015

CVE-2014-3571  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

Upgrade openssl to version 1.0.1k, 1.0.0p, 0.9.8zd or higher.

Overview

Affected versions of this package are vulnerable to NULL Pointer Dereference. OpenSSL allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.

CVSS Scores

version 3.1