gptkbp:instance_of
|
gptkb:terrorist_attack
|
gptkbp:accreditation
|
None.
|
gptkbp:availability
|
Public.
Partial.
|
gptkbp:broadcasts
|
Open SSL team.
|
gptkbp:capacity
|
Low.
|
gptkbp:certification
|
None.
|
gptkbp:check_in_time
|
4.0.
|
gptkbp:combat_system
|
AV: N/ AC: L/ Au: N/ C: N/ I: N/ A: P.
|
gptkbp:coordinates
|
Remote.
|
gptkbp:difficulty
|
gptkb:High
|
gptkbp:discovered_by
|
Public.
|
gptkbp:distributor
|
Open SSL Software Foundation.
|
gptkbp:enemy
|
Network.
|
gptkbp:environment
|
3.0.
|
gptkbp:film_score
|
4.0.
|
gptkbp:final_score
|
5.0.
|
gptkbp:first_published
|
2014-07-09
2014-07-09.
|
gptkbp:grades
|
5.0.
|
gptkbp:has_impact_on
|
2.
|
https://www.w3.org/2000/01/rdf-schema#label
|
CVE-2014-3474
|
gptkbp:impact
|
2.
Potential crash of the application.
Allows remote attackers to cause a denial of service.
|
gptkbp:interacts_with
|
None.
|
gptkbp:is_a_solution_for
|
Upgrade to Open SSL 1.0.1h or 1.0.2.
|
gptkbp:is_described_as
|
A vulnerability in the Open SSL library.
|
gptkbp:is_referenced_in
|
https://www.openssl.org/news/secadv_20140709.txt
|
gptkbp:is_vulnerable_to
|
Yes.
Security.
Patched.
3.9.
Buffer overflow.
Exploitable.
Open SSL.
|
gptkbp:issues
|
Patch released.
|
gptkbp:latest_version
|
1.0.1 through 1.0.1g.
|
gptkbp:name
|
CWE-119.
|
gptkbp:notable_album
|
2014-07-09.
|
gptkbp:platform
|
Linux, Windows.
|
gptkbp:provides_access_to
|
None.
Network.
|
gptkbp:published_year
|
2014-07-09
|
gptkbp:registration
|
CVE-2014-3474.
|
gptkbp:reports_to
|
2014-07-09.
NVD.
|
gptkbp:restoration
|
Official fix.
|
gptkbp:runtime
|
3.
|
gptkbp:safety_record
|
Medium.
|
gptkbp:security_features
|
None.
3.
|
gptkbp:status
|
Resolved.
|
gptkbp:supports
|
Open SSL 1.0.1 and 1.0.2.
|
gptkbp:threats
|
Low.
|
gptkbp:type
|
Denial of Service.
|