CVE-2014-3488
Published Jul 31, 2014
Last updated 5 years ago
Overview
- Description
- The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C25A1DCE-E327-4BB4-9689-FCFEC8D605EA", "versionEndIncluding": "3.9.1.1" }, { "criteria": "cpe:2.3:a:netty:netty:3.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3EEBC0F-815E-4F66-B9B4-1256AAAB03A7" }, { "criteria": "cpe:2.3:a:netty:netty:3.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "140919D1-2868-4F11-8421-5CA35A3FFCA0" }, { "criteria": "cpe:2.3:a:netty:netty:3.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28C7EA90-B934-438B-9705-5B53B0F3D09C" }, { "criteria": "cpe:2.3:a:netty:netty:3.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C1DCF99-CBB1-4FD2-B073-B91A2DD27290" }, { "criteria": "cpe:2.3:a:netty:netty:3.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4EA1D52-61D5-4448-BA64-0D9A8FFFE173" }, { "criteria": "cpe:2.3:a:netty:netty:3.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CFB08C8-9021-4C26-B8B8-A2C07EB4BB83" }, { "criteria": "cpe:2.3:a:netty:netty:3.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3707350-D658-485E-A136-04AF3ED7AF4E" }, { "criteria": "cpe:2.3:a:netty:netty:3.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D4831E7-1F30-4AEA-82D8-E703701DC8B4" }, { "criteria": "cpe:2.3:a:netty:netty:3.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CE508BE-00C4-4304-BA92-063129C2B6E5" }, { "criteria": "cpe:2.3:a:netty:netty:3.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3876968E-7B85-4149-BF6B-488D32A7B2B7" }, { "criteria": "cpe:2.3:a:netty:netty:3.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C365439-029C-4F5F-ADB2-0153DD4965B2" }, { "criteria": "cpe:2.3:a:netty:netty:3.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CAECE2B6-DD9F-4FEC-B15F-EA99BF716390" }, { "criteria": "cpe:2.3:a:netty:netty:3.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9879F5B0-DF82-470F-A028-1B69BFB67FB9" }, { "criteria": "cpe:2.3:a:netty:netty:3.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32DFF597-4F5A-44E1-BB82-F5DF7942F6AC" } ], "operator": "OR" } ] } ]