Vulnerability Name:

CVE-2014-3508

Assigned:2014-05-14
Published:2014-08-06
Updated:2017-11-14
Summary:The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.
CVSS v3 Severity:3.7 Low (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.3 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
References:Source: NETBSD
Type: UNKNOWN
NetBSD-SA2014-008

Source: CONFIRM
Type: UNKNOWN
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc

Source: CONFIRM
Type: UNKNOWN
http://linux.oracle.com/errata/ELSA-2014-1052.html

Source: CONFIRM
Type: UNKNOWN
http://linux.oracle.com/errata/ELSA-2014-1053.html

Source: FEDORA
Type: UNKNOWN
FEDORA-2014-9301

Source: FEDORA
Type: UNKNOWN
FEDORA-2014-9308

Source: SUSE
Type: UNKNOWN
SUSE-SU-2015:0578

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2016:0640

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2014:1052

Source: HP
Type: UNKNOWN
HPSBUX03095

Source: HP
Type: UNKNOWN
HPSBGN03099

Source: HP
Type: UNKNOWN
HPSBOV03099

Source: HP
Type: UNKNOWN
SSRT101894

Source: HP
Type: UNKNOWN
HPSBMU03267

Source: HP
Type: UNKNOWN
SSRT101846

Source: HP
Type: UNKNOWN
HPSBMU03304

Source: HP
Type: UNKNOWN
HPSBMU03263

Source: HP
Type: UNKNOWN
HPSBMU03261

Source: REDHAT
Type: UNKNOWN
RHSA-2014:1256

Source: REDHAT
Type: UNKNOWN
RHSA-2014:1297

Source: SECUNIA
Type: UNKNOWN
58962

Source: SECUNIA
Type: UNKNOWN
59700

Source: SECUNIA
Type: UNKNOWN
59710

Source: SECUNIA
Type: UNKNOWN
59743

Source: SECUNIA
Type: UNKNOWN
60022

Source: SECUNIA
Type: UNKNOWN
60221

Source: SECUNIA
Type: UNKNOWN
60410

Source: SECUNIA
Type: UNKNOWN
60493

Source: SECUNIA
Type: UNKNOWN
60684

Source: SECUNIA
Type: UNKNOWN
60778

Source: SECUNIA
Type: UNKNOWN
60803

Source: SECUNIA
Type: UNKNOWN
61017

Source: SECUNIA
Type: UNKNOWN
61100

Source: SECUNIA
Type: UNKNOWN
61171

Source: SECUNIA
Type: UNKNOWN
61184

Source: SECUNIA
Type: UNKNOWN
61214

Source: SECUNIA
Type: UNKNOWN
61250

Source: SECUNIA
Type: UNKNOWN
61392

Source: CONFIRM
Type: UNKNOWN
http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15571.html

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21681752

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21682293

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21683389

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21686997

Source: DEBIAN
Type: UNKNOWN
DSA-2998

Source: CONFIRM
Type: UNKNOWN
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2014:158

Source: BID
Type: UNKNOWN
69075

Source: SECTRACK
Type: UNKNOWN
1030693

Source: CONFIRM
Type: UNKNOWN
http://www.tenable.com/security/tns-2014-06

Source: CONFIRM
Type: UNKNOWN
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3508_information_disclosure

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=1127490

Source: XF
Type: UNKNOWN
openssl-cve20143508-info-disc(95165)

Source: CONFIRM
Type: UNKNOWN
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380

Source: MLIST
Type: UNKNOWN
[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released

Source: CONFIRM
Type: UNKNOWN
https://support.citrix.com/article/CTX216642

Source: FREEBSD
Type: UNKNOWN
FreeBSD-SA-14:18

Source: CONFIRM
Type: VENDOR_ADVISORY
https://www.openssl.org/news/secadv_20140806.txt

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20143508
    V
    CVE-2014-3508
    2017-11-19
    oval:org.mitre.oval:def:26579
    V
    HP-UX running OpenSSL, Multiple Vulnerabilities
    2015-04-20
    oval:org.mitre.oval:def:27233
    P
    ELSA-2014-1052 -- openssl security update (moderate)
    2015-02-23
    oval:org.mitre.oval:def:28044
    P
    SUSE-SU-2014:1557-2 -- Security update for compat-openssl097g (moderate)
    2015-02-23
    oval:org.mitre.oval:def:26954
    P
    ELSA-2014-1053 -- openssl security update (moderate)
    2014-12-15
    oval:org.mitre.oval:def:26542
    V
    AIX OpenSSL allows attackers to obtain sensitive information
    2014-11-17
    oval:org.mitre.oval:def:26304
    P
    SUSE-SU-2014:1104-1 -- Security update for OpenSSL
    2014-11-10
    oval:org.mitre.oval:def:26562
    P
    SUSE-SU-2014:1049-1 -- Security update for OpenSSL
    2014-10-27
    oval:org.mitre.oval:def:26274
    V
    Vulnerability in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, allows context-dependent attackers to obtain sensitive information from process stack memory
    2014-10-13
    oval:org.mitre.oval:def:26351
    P
    DSA-2998-1 openssl - security update
    2014-10-13
    oval:org.mitre.oval:def:26426
    P
    RHSA-2014:1052: openssl security update (Moderate)
    2014-10-13
    oval:org.mitre.oval:def:26381
    P
    USN-2308-1 -- openssl vulnerabilities
    2014-10-13
    oval:org.mitre.oval:def:26315
    P
    RHSA-2014:1053: openssl security update (Moderate)
    2014-10-13
    oval:com.redhat.rhsa:def:20141052
    P
    RHSA-2014:1052: openssl security update (Moderate)
    2014-08-13
    oval:com.ubuntu.precise:def:20143508000
    V
    CVE-2014-3508 on Ubuntu 12.04 LTS (precise) - medium.
    2014-08-13
    oval:com.redhat.rhsa:def:20141053
    P
    RHSA-2014:1053: openssl security update (Moderate)
    2014-08-13
    oval:com.ubuntu.trusty:def:20143508000
    V
    CVE-2014-3508 on Ubuntu 14.04 LTS (trusty) - medium.
    2014-08-13
    oval:com.ubuntu.xenial:def:20143508000
    V
    CVE-2014-3508 on Ubuntu 16.04 LTS (xenial) - medium.
    2014-08-13
    BACK
    openssl openssl 0.9.8
    openssl openssl 0.9.8a
    openssl openssl 0.9.8b
    openssl openssl 0.9.8c
    openssl openssl 0.9.8d
    openssl openssl 0.9.8e
    openssl openssl 0.9.8f
    openssl openssl 0.9.8g
    openssl openssl 0.9.8h
    openssl openssl 0.9.8i
    openssl openssl 0.9.8j
    openssl openssl 0.9.8k
    openssl openssl 0.9.8l
    openssl openssl 0.9.8m
    openssl openssl 0.9.8m beta1
    openssl openssl 0.9.8n
    openssl openssl 0.9.8o
    openssl openssl 0.9.8p
    openssl openssl 0.9.8q
    openssl openssl 0.9.8r
    openssl openssl 0.9.8s
    openssl openssl 0.9.8t
    openssl openssl 0.9.8u
    openssl openssl 0.9.8v
    openssl openssl 0.9.8w
    openssl openssl 0.9.8x
    openssl openssl 0.9.8y
    openssl openssl 0.9.8za
    openssl openssl 1.0.0
    openssl openssl 1.0.0 beta1
    openssl openssl 1.0.0 beta2
    openssl openssl 1.0.0 beta3
    openssl openssl 1.0.0 beta4
    openssl openssl 1.0.0 beta5
    openssl openssl 1.0.0a
    openssl openssl 1.0.0b
    openssl openssl 1.0.0c
    openssl openssl 1.0.0d
    openssl openssl 1.0.0e
    openssl openssl 1.0.0f
    openssl openssl 1.0.0g
    openssl openssl 1.0.0h
    openssl openssl 1.0.0i
    openssl openssl 1.0.0j
    openssl openssl 1.0.0k
    openssl openssl 1.0.0l
    openssl openssl 1.0.0m
    openssl openssl 1.0.1
    openssl openssl 1.0.1 beta1
    openssl openssl 1.0.1 beta2
    openssl openssl 1.0.1 beta3
    openssl openssl 1.0.1a
    openssl openssl 1.0.1b
    openssl openssl 1.0.1c
    openssl openssl 1.0.1d
    openssl openssl 1.0.1e
    openssl openssl 1.0.1f
    openssl openssl 1.0.1g
    openssl openssl 1.0.1h
    redhat enterprise_linux 7
    redhat enterprise_linux 6
    redhat enterprise_linux 5