MEDIUM · 4.3

CVE-2014-3470

The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to...

Vulnerability Description

The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
OpensslOpenssl< 0.9.8za
RedhatStorage2.1
FedoraprojectFedoraAll versions
RedhatEnterprise Linux5
MariadbMariadb>= 10.0.0, < 10.0.13
OpensuseLeap42.1
OpensuseOpensuse13.2
SuseLinux Enterprise Desktop12
SuseLinux Enterprise Server12
SuseLinux Enterprise Software Development Kit12
SuseLinux Enterprise Workstation Extension12

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-3470?

CVE-2014-3470 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to...

How severe is CVE-2014-3470?

CVE-2014-3470 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-3470?

Check the references section above for vendor advisories and patch information. Affected products include: Openssl Openssl, Redhat Storage, Fedoraproject Fedora, Redhat Enterprise Linux, Mariadb Mariadb.