The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
|
Configuration 11 (hide)
|
Configuration 12 (hide)
|
Configuration 13 (hide)
|
Configuration 14 (hide)
|
Configuration 15 (hide)
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
|
Configuration 18 (hide)
|
History
02 Jul 2024, 16:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.1:*:*:*:*:*:*:* cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* |
|
First Time |
Broadcom symantec Messaging Gateway
Splunk splunk Splunk Broadcom |
|
References | () http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/ - Issue Tracking, Third Party Advisory | |
References | () http://cogentdatahub.com/ReleaseNotes.html - Release Notes | |
References | () http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3 - Broken Link | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html - Broken Link, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html - Broken Link, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139722163017074&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139757726426985&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139757819327350&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139757919027752&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139758572430452&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139765756720506&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139774054614965&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139774703817488&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139808058921905&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139817685517037&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139817727317190&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139817782017443&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139824923705461&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139824993005633&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139833395230364&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139835815211508&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139835844111589&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139836085512508&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139842151128341&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139843768401936&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139869720529462&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139869891830365&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139889113431619&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139889295732144&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139905202427693&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139905243827825&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139905295427946&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139905351928096&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139905405728262&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139905458328378&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139905653828999&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=139905868529690&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=140015787404650&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=140075368411126&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=140724451518351&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=140752315422991&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=141287864628122&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=142660345230545&w=2 - Mailing List, Third Party Advisory | |
References | () http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3 - Permissions Required, Third Party Advisory | |
References | () http://secunia.com/advisories/57347 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/57483 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/57721 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/57836 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/57966 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/57968 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/59139 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/59243 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/59347 - Broken Link, Third Party Advisory | |
References | () http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf - Broken Link, Third Party Advisory | |
References | () http://www.debian.org/security/2014/dsa-2896 - Mailing List, Third Party Advisory | |
References | () http://www.f-secure.com/en/web/labs_global/fsc-2014-1 - Broken Link, Third Party Advisory | |
References | () http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ - Release Notes | |
References | () http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ - Release Notes | |
References | () http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ - Release Notes | |
References | () http://www.kerio.com/support/kerio-control/release-history - Broken Link, Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 - Broken Link, Third Party Advisory | |
References | () http://www.openssl.org/news/secadv_20140407.txt - Broken Link, Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - Patch, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html - Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/534161/100/0/threaded - Broken Link, Not Applicable, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/66690 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1030026 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1030074 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1030077 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1030078 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1030079 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1030080 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1030081 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1030082 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vmware.com/security/advisories/VMSA-2014-0012.html - Broken Link | |
References | () http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 - Broken Link | |
References | () https://blog.torproject.org/blog/openssl-bug-cve-2014-0160 - Issue Tracking | |
References | () https://code.google.com/p/mod-spdy/issues/detail?id=85 - Issue Tracking | |
References | () https://filezilla-project.org/versions.php?type=server - Release Notes | |
References | () https://gist.github.com/chapmajs/10473815 - Exploit | |
References | () https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E - Mailing List, Patch, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E - Mailing List, Patch, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E - Mailing List, Patch, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E - Mailing List, Patch, Third Party Advisory | |
References | () https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html - Mailing List, Third Party Advisory | |
References | () https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html - Exploit, Permissions Required, Third Party Advisory | |
References | () https://www.cert.fi/en/reports/2014/vulnerability788210.html - Not Applicable, Third Party Advisory | |
References | () https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd - Broken Link, Exploit, Third Party Advisory |
07 Nov 2023, 02:18
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2014-04-07 22:55
Updated : 2024-07-02 16:52
NVD link : CVE-2014-0160
Mitre link : CVE-2014-0160
CVE.ORG link : CVE-2014-0160
JSON object : View
Products Affected
opensuse
- opensuse
siemens
- simatic_s7-1500t
- cp_1543-1
- simatic_s7-1500
- simatic_s7-1500t_firmware
- wincc_open_architecture
- cp_1543-1_firmware
- application_processing_engine
- elan-8.2
- application_processing_engine_firmware
- simatic_s7-1500_firmware
mitel
- mivoice
- micollab
ricon
- s9922l_firmware
- s9922l
redhat
- enterprise_linux_server_aus
- enterprise_linux_desktop
- virtualization
- enterprise_linux_server_eus
- storage
- enterprise_linux_server_tus
- enterprise_linux_workstation
- enterprise_linux_server
- gluster_storage
intellian
- v100
- v60
- v60_firmware
- v100_firmware
splunk
- splunk
debian
- debian_linux
openssl
- openssl
canonical
- ubuntu_linux
fedoraproject
- fedora
filezilla-project
- filezilla_server
broadcom
- symantec_messaging_gateway
CWE
CWE-125
Out-of-bounds Read