// For flags

CVE-2014-8628

Debian Security Advisory 3116-1

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Memory leak in PolarSSL before 1.2.12 and 1.3.x before 1.3.9 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted X.509 certificates. NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2014-9744 for the ClientHello message issue.

Vulnerabilidad de fuga de memoria en PolarSSL en versiones anteriores a 1.2.12 y 1.3.x en versiones anteriores a 1.3.9, permite a atacantes remotos causar una denegación de servicio (consumo de memoria) a través de una gran cantidad de certificados X.509 manipulados. NOTA: este identificador ha sido SEPARADO por ADT3 debido a las diferentes versiones afectadas. Ver CVE-2014-9744 para el caso de mensaje ClientHello.

It was discovered that a memory leak in parsing X.509 certificates may result in denial of service.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-11-06 CVE Reserved
  • 2014-12-31 CVE Published
  • 2023-11-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-399: Resource Management Errors
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Polarssl
Search vendor "Polarssl"
Polarssl
Search vendor "Polarssl" for product "Polarssl"
<= 1.2.11
Search vendor "Polarssl" for product "Polarssl" and version " <= 1.2.11"
-
Affected
Polarssl
Search vendor "Polarssl"
Polarssl
Search vendor "Polarssl" for product "Polarssl"
1.3.0
Search vendor "Polarssl" for product "Polarssl" and version "1.3.0"
-
Affected
Polarssl
Search vendor "Polarssl"
Polarssl
Search vendor "Polarssl" for product "Polarssl"
1.3.1
Search vendor "Polarssl" for product "Polarssl" and version "1.3.1"
-
Affected
Polarssl
Search vendor "Polarssl"
Polarssl
Search vendor "Polarssl" for product "Polarssl"
1.3.2
Search vendor "Polarssl" for product "Polarssl" and version "1.3.2"
-
Affected
Polarssl
Search vendor "Polarssl"
Polarssl
Search vendor "Polarssl" for product "Polarssl"
1.3.3
Search vendor "Polarssl" for product "Polarssl" and version "1.3.3"
-
Affected
Polarssl
Search vendor "Polarssl"
Polarssl
Search vendor "Polarssl" for product "Polarssl"
1.3.4
Search vendor "Polarssl" for product "Polarssl" and version "1.3.4"
-
Affected
Polarssl
Search vendor "Polarssl"
Polarssl
Search vendor "Polarssl" for product "Polarssl"
1.3.5
Search vendor "Polarssl" for product "Polarssl" and version "1.3.5"
-
Affected
Polarssl
Search vendor "Polarssl"
Polarssl
Search vendor "Polarssl" for product "Polarssl"
1.3.6
Search vendor "Polarssl" for product "Polarssl" and version "1.3.6"
-
Affected
Polarssl
Search vendor "Polarssl"
Polarssl
Search vendor "Polarssl" for product "Polarssl"
1.3.7
Search vendor "Polarssl" for product "Polarssl" and version "1.3.7"
-
Affected
Polarssl
Search vendor "Polarssl"
Polarssl
Search vendor "Polarssl" for product "Polarssl"
1.3.8
Search vendor "Polarssl" for product "Polarssl" and version "1.3.8"
-
Affected