Search for vulnerabilities
| Vulnerability ID | VCID-hguw-9r9t-63f6 |
| Aliases |
CVE-2014-0195
|
| Summary | |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 0.8 |
| Risk | 1.6 |
| Affected and Fixed Packages | Package Details |
| System | Score | Found at |
|---|---|---|
| epss | 0.9232 | https://api.first.org/data/v1/epss?cve=CVE-2014-0195 |
| epss | 0.9232 | https://api.first.org/data/v1/epss?cve=CVE-2014-0195 |
| epss | 0.9232 | https://api.first.org/data/v1/epss?cve=CVE-2014-0195 |
| epss | 0.9232 | https://api.first.org/data/v1/epss?cve=CVE-2014-0195 |
| epss | 0.9232 | https://api.first.org/data/v1/epss?cve=CVE-2014-0195 |
| epss | 0.9232 | https://api.first.org/data/v1/epss?cve=CVE-2014-0195 |
| Data source | Metasploit |
|---|---|
| Description | This module performs a Denial of Service Attack against Datagram TLS in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h. This occurs when a DTLS ClientHello message has multiple fragments and the fragment lengths of later fragments are larger than that of the first, a buffer overflow occurs, causing a DoS. |
| Note | Stability: - crash-service-down SideEffects: [] Reliability: [] |
| Ransomware campaign use | Unknown |
| Source publication date | June 5, 2014 |
| Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/ssl/dtls_fragment_overflow.rb |
| Percentile | 0.99713 |
| EPSS Score | 0.9232 |
| Published At | Sept. 16, 2025, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2025-07-31T08:34:22.286149+00:00 | Ubuntu USN Importer | Import | https://usn.ubuntu.com/2232-1/ | 37.0.0 |