Search for vulnerabilities
Vulnerability ID | VCID-hguw-9r9t-63f6 |
Aliases |
CVE-2014-0195
|
Summary | |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 0.8 |
Risk | 1.6 |
Affected and Fixed Packages | Package Details |
System | Score | Found at |
---|---|---|
epss | 0.9232 | https://api.first.org/data/v1/epss?cve=CVE-2014-0195 |
epss | 0.9232 | https://api.first.org/data/v1/epss?cve=CVE-2014-0195 |
epss | 0.9232 | https://api.first.org/data/v1/epss?cve=CVE-2014-0195 |
epss | 0.9232 | https://api.first.org/data/v1/epss?cve=CVE-2014-0195 |
epss | 0.9232 | https://api.first.org/data/v1/epss?cve=CVE-2014-0195 |
epss | 0.9232 | https://api.first.org/data/v1/epss?cve=CVE-2014-0195 |
Data source | Metasploit |
---|---|
Description | This module performs a Denial of Service Attack against Datagram TLS in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h. This occurs when a DTLS ClientHello message has multiple fragments and the fragment lengths of later fragments are larger than that of the first, a buffer overflow occurs, causing a DoS. |
Note | Stability: - crash-service-down SideEffects: [] Reliability: [] |
Ransomware campaign use | Unknown |
Source publication date | June 5, 2014 |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/ssl/dtls_fragment_overflow.rb |
Percentile | 0.99713 |
EPSS Score | 0.9232 |
Published At | Aug. 5, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T08:34:22.286149+00:00 | Ubuntu USN Importer | Import | https://usn.ubuntu.com/2232-1/ | 37.0.0 |