OpenSSL.Invalid.SRP.Parameter.A.Buffer.Overflow
Description
This indicates an attack attempt against a Buffer Overflow vulnerability in OpenSSL.
The vulnerability is due to an error in the application when handling a maliciously crafted SRP packet. A remote attacker can exploit this to execute arbitrary code within the context of the affected server via crafted packets.
Affected Products
OpenSSL Project OpenSSL prior to 1.0.1i
Impact
System Compromise: Remote attackers can execute arbitrary code in the context of the affected application
Recommended Actions
Apply the most recent upgrade or patch from the vendor
https://www.openssl.org/news/secadv_20140806.txt
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-01-24 | 14.532 | Sig Added |