Advisory Details

June 5th, 2014

OpenSSL DTLS Fragment Out-Of-Bounds Write Remote Code Execution Vulnerability

ZDI-14-173
ZDI-CAN-2304

CVE ID CVE-2014-0195
CVSS SCORE 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P
AFFECTED VENDORS OpenSSL
AFFECTED PRODUCTS OpenSSL
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['13873', '13874', '13875']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OpenSSL. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of DTLS packets. The issue lies in the assumption that all fragments specify the same message size. An attacker could leverage this vulnerability to execute code in the context of the process using OpenSSL.

ADDITIONAL DETAILS OpenSSL has issued an update to correct this vulnerability. More details can be found at:
https://www.openssl.org/news/secadv_20140605.txt
DISCLOSURE TIMELINE
  • 2014-04-22 - Vulnerability reported to vendor
  • 2014-06-05 - Coordinated public release of advisory
CREDIT Jüri Aedla
BACK TO ADVISORIES