Public Date:
2014-A-0100, 2014-B-0077
1103593: CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake
A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash.

Find out more about CVE-2014-0221 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 4.3
Base Metrics AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat JBoss Enterprise Application Platform 6.3 RHSA-2014:1021 2014-08-06
Red Hat Enterprise Linux 6 (openssl) RHSA-2014:0625 2014-06-05
Red Hat Storage Server 2.1 (openssl) RHSA-2014:0628 2014-06-05
Red Hat Enterprise Linux 7 (openssl) RHSA-2014:0679 2014-06-10
Red Hat Enterprise Linux 5 (openssl) RHSA-2014:1053 2014-08-13
Red Hat JBoss Web Server 2.1 RHSA-2014:1086 2014-08-21

Affected Packages State

Platform Package State
Red Hat JBoss EWS 1 openssl Will not fix
Red Hat JBoss EAP 5 openssl Will not fix
Red Hat Enterprise Linux 7 openssl098e Will not fix
Red Hat Enterprise Linux 6 openssl098e Will not fix
Red Hat Enterprise Linux 5 openssl097a Not affected
RHEV Manager 3 mingw-virt-viewer Not affected
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.


Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Imre Rad of Search-Lab as the original reporter of this issue.

External References

Last Modified