cvelist/2014/2xxx/CVE-2014-2896.json

77 lines
2.5 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 03:32:22 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2896",
2020-01-28 16:01:13 +00:00
"STATE": "PUBLIC"
2019-03-18 03:32:22 +00:00
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
2020-01-28 16:01:13 +00:00
"value": "The DoAlert function in the (1) TLS and (2) DTLS implementations in wolfSSL CyaSSL before 2.9.4 allows remote attackers to have unspecified impact and vectors, which trigger memory corruption or an out-of-bounds read."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "http://www.wolfssl.com/yaSSL/Blog/Entries/2014/4/11_wolfSSL_Security_Advisory__April_9%2C_2014.html",
"url": "http://www.wolfssl.com/yaSSL/Blog/Entries/2014/4/11_wolfSSL_Security_Advisory__April_9%2C_2014.html"
},
{
"refsource": "CONFIRM",
"name": "http://www.wolfssl.com/yaSSL/Docs-cyassl-changelog.html",
"url": "http://www.wolfssl.com/yaSSL/Docs-cyassl-changelog.html"
},
{
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2014/q2/126",
"url": "http://seclists.org/oss-sec/2014/q2/126"
},
{
"refsource": "MISC",
"name": "http://seclists.org/oss-sec/2014/q2/130",
"url": "http://seclists.org/oss-sec/2014/q2/130"
2019-03-18 03:32:22 +00:00
}
]
}
}