FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-28 15:43:32 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
5ac53801-ec2e-11e3-9cf3-3c970e169bc2OpenSSL -- multiple vulnerabilities

The OpenSSL Project reports:

An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. [CVE-2014-0224]

By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. [CVE-2014-0221]

A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. [CVE-2014-0195]

OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack. [CVE-2014-3470]


Discovery 2014-06-05
Entry 2014-06-05
openssl
ge 1.0.1 lt 1.0.1_13

mingw32-openssl
ge 1.0.1 lt 1.0.1h

FreeBSD
ge 8.0 lt 8.4_12

ge 9.1 lt 9.1_15

ge 9.2 lt 9.2_8

ge 10.0 lt 10.0_5

CVE-2014-0195
CVE-2014-0221
CVE-2014-0224
CVE-2014-3470
SA-14:14.openssl
http://www.openssl.org/news/secadv_20140605.txt