ID

VAR-201404-0592


CVE

CVE-2014-0160


TITLE

OpenSSL TLS heartbeat extension read overflow discloses sensitive information

Trust: 0.8

sources: CERT/CC: VU#720951

DESCRIPTION

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. OpenSSL 1.0.1 and 1.0.2 beta contain a vulnerability that could disclose sensitive private information to an attacker. This vulnerability is commonly referred to as "heartbleed.". Ruby on Rails is prone to a denial-of-service vulnerability. Exploiting this issue allows remote attackers to trigger denial-of-service conditions due to excessive CPU consumption. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: rhev-hypervisor6 security update Advisory ID: RHSA-2014:0396-01 Product: Red Hat Enterprise Virtualization Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0396.html Issue date: 2014-04-10 CVE Names: CVE-2014-0160 ===================================================================== 1. Summary: An updated rhev-hypervisor6 package that fixes one security issue is now available for Red Hat Enterprise Virtualization Hypervisor 3.2. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Relevant releases/architectures: RHEV Hypervisor for RHEL-6 - noarch 3. Description: The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: a subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Important: This update is an emergency security fix being provided outside the scope of the published support policy for Red Hat Enterprise Virtualization listed in the References section. In accordance with the support policy for Red Hat Enterprise Virtualization, Red Hat Enterprise Virtualization Hypervisor 3.2 will not receive future security updates. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. (CVE-2014-0160) Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Neel Mehta of Google Security as the original reporter. Users of the Red Hat Enterprise Virtualization Hypervisor are advised to upgrade to this updated package, which corrects this issue. Solution: This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 To upgrade Hypervisors in Red Hat Enterprise Virtualization environments using the disk image provided by this package, refer to: https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html 5. Bugs fixed (https://bugzilla.redhat.com/): 1084875 - CVE-2014-0160 openssl: information disclosure in handling of TLS heartbeat extension packets 1085357 - Packaging of RHEV-H for RHEV 3.2.6 ASYNC 6. Package List: RHEV Hypervisor for RHEL-6: noarch: rhev-hypervisor6-6.5-20140118.1.3.2.el6_5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0160.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/site/support/policy/updates/rhev/ 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04239372 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04239372 Version: 4 HPSBMU02998 rev.4 - HP System Management Homepage (SMH) running OpenSSL on Linux and Windows, Remote Disclosure of Information, Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2014-04-13 Last Updated: 2014-05-13 Potential Security Impact: Remote disclosure of information, Denial of Service (DoS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS). References: CVE-2014-0160 (SSRT101501) Disclosure of Information - "Heartbleed" CVE-2013-4353 Denial of Service (DoS) CVE-2013-6449 Denial of Service (DoS) CVE-2013-6450 Denial of Service (DoS) SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP System Management Homepage (SMH) v7.1.2, v7.2, v7.2.1, v7.2.2, v7.3, v7.3.1 for Linux and Windows. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2013-4353 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2013-6449 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2013-6450 (AV:N/AC:M/Au:N/C:N/I:P/A:P) 5.8 CVE-2014-0160 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has made the following software updates available to resolve the vulnerabilities for the impacted versions of HP System Management Homepage (SMH): Product version/Platform Download Location SMH 7.2.3 Windows x86 http://www.hp.com/swpublishing/MTX-d1488fd987894bc4ab3fe0ef52 SMH 7.2.3 Windows x64 http://www.hp.com/swpublishing/MTX-4575754bbb614b58bf0ae1ac37 SMH 7.3.2.1(B) Windows x86 http://www.hp.com/swpublishing/MTX-27e03b2f9cd24e77adc9dba94a SMH 7.3.2.1(B) Windows x64 http://www.hp.com/swpublishing/MTX-37075daeead2433cb41b59ae76 SMH 7.3.2 Linux x86 http://www.hp.com/swpublishing/MTX-3d92ccccf85f404e8ba36a8178 SMH 7.3.2 Linux x64 http://www.hp.com/swpublishing/MTX-bfd3c0fb11184796b9428ced37 Notes SMH 7.2.3 recommended for customers running Windows 2003 OS Updated OpenSSL to version 1.0.1g Note: If you believe your SMH installation was exploited while it was running components vulnerable to heartbleed, there are some steps to perform after youve upgraded to the non-vulnerable components. These steps include revoking, recreating, and re-importing certificates and resetting passwords that might have been harvested by a malicious attacker using the heartbleed vulnerability. Impact on VCA - VCRM communication: VCA configures VCRM by importing the SMH certificate from the SMH of VCA into the SMH of VCRM. When this certificate is deleted & regenerated (as suggested before), it needs to be (re)imported if the user wants to continue with Trust by Certificate option, and the outdated certificate should be revoked (deleted) from each location where it was previously imported. If you use HPSIMs 2-way trust feature, and have imported SMH certificates into HPSIM, you will also need to revoke those SMH certificated from HPSIM and reimport the newly created SMH certificates. Though SMH uses OS credentials using OS-based APIs, user provided credentials are passed from the client (browser) to the server (SMH) using the HTTPS protocol. If you suspect your systems using SMH were exploited while they were vulnerable to heartbleed, these passwords need to be reset. Frequently Asked Questions Will updated systems require a reboot after applying the SMH patch? No, reboot of the system will not be required. Installing the new build is sufficient to get back to the normal state. Is a Firmware Update necessary in addition to the SMH patch? No, only the SMH update is sufficient to remove the heartbleed-vulnerable version of SMH. Will new certificates be issued along with the patch, or need to be handled separately? If you suspect the certificate has been compromised due to this vulnerability, we do recommend to delete and revoke the certificate, or SMH will reuse the existing certificate. New certificate will be created when SMH service starts (at the end of the fresh / upgrade installation). Instructions on deleting the certificate are in the notes above. Where can I get SMH documentation? All major documents are available at: http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library Select HP Insight Management under Product and Solutions & check HP System Management Homepage to get SMH related documents. What are the recommended upgrade paths? See the table below: SMH DVD SPP Recommended SMH update for Linux Recommended SMH update for Windows 2003 and Widows 2003 R2 Recommended SMH update for other Windows OS versions v7.1.2 v7.1.2 2012.10.0 v7.3.2 v7.2.3 v7.3.2 v7.2.0 v7.2.0 2013.02.0(B) v7.3.2 v7.2.3 v7.3.2 v7.2.1 v7.2u1 v7.3.2 v7.2.3 v7.3.2 v7.2.2 v7.2u2 2013.09.0(B) v7.3.2 v7.2.3 v7.3.2 v7.3.0 v7.3.0 v7.3.2 not supported v7.3.2 v7.3.1 v7.3.1 2014.02.0 v7.3.2 not supported v7.3.2 How can I verify whether my setup is patched successfully? SMH version can be verified by executing following command on: Windows: hp\hpsmh\bin\smhlogreader version Linux: /opt/hp/hpsmh/bin/smhlogreader version Will VCA-VCRM communication be impacted due to the SMH certificate being deleted? VCA configures VCRM by importing the SMH certificate (sslshare\cert.pem) from the SMH of VCA to the SMH of VCRM. When this certificate is deleted & regenerated (as suggested before), it needs to be (re)imported if user wants to continue with Trust by Certificate option, and remove the old, previously imported certificate. Should I reset password on all managed nodes, where SMH was/is running? Though SMH uses OS credentials using OS based APIs, user-provided credentials are passed from the client (browser) to the server (SMH) using the HTTPS protocol. Passwords need to be reset if you suspect the vulnerable version of SMH was exploited by malicious users/ hackers. HISTORY Version:1 (rev.1) - 13 April 2014 Initial release Version:2 (rev.2) - 17 April 2014 SMH 7.2.3 and 7.3.2 released Version:3 (rev.3) - 30 April 2014 SMH 7.3.2.1(B) released Version:4 (rev.4) - 13 May 2014 Added additional remediation steps for post update installation Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Until the firmware updates are available, HP recommends that customers disable the HTTPS management protocol and instead manage the device securely using SSH. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-04-22-4 AirPort Base Station Firmware Update 7.7.3 AirPort Base Station Firmware Update 7.7.3 is now available and addresses the following: Available for: AirPort Extreme and AirPort Time Capsule base stations with 802.11ac Impact: An attacker in a privileged network position may obtain memory contents Description: An out-of-bounds read issue existed in the OpenSSL library when handling TLS heartbeat extension packets. An attacker in a privileged network position could obtain information from process memory. This issue was addressed through additional bounds checking. Only AirPort Extreme and AirPort Time Capsule base stations with 802.11ac are affected, and only if they have Back to My Mac or Send Diagnostics enabled. Other AirPort base stations are not impacted by this issue. CVE-ID CVE-2014-0160 : Riku, Antti, and Matti of Codenomicon and Neel Mehta of Google Security Installation note for Firmware version 7.7.3 Firmware version 7.7.3 is installed on AirPort Extreme or AirPort Time Capsule base stations with 802.11ac using AirPort Utility for Mac or iOS. Use AirPort Utility 6.3.1 or later on OS X, or AirPort Utility 1.3.1 or later on iOS to upgrade to Firmware version 7.7.3. AirPort Utility for Mac is a free download from http://www.apple.com/support/downloads/ and AirPort Utility for iOS is a free download from the App Store. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This bulletin will give you the information needed to update your HP Insight Control server deployment solution. Install HP Management Agents for Windows x86/x64 Install HP Management Agents for RHEL 5 x64 Install HP Management Agents for RHEL 6 x64 Install HP Management Agents for SLES 10 x64 Install HP Management Agents for SLES 11 x64 References: CVE-2014-0160 (SSRT101538) SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, v7.2.2 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-0160 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP is actively working to address this vulnerability for the impacted versions of HP Insight Control server deployment. This bulletin may be revised. It is recommended that customers take the following approaches depending on the version of HP Insight Control server deployment: To address the vulnerability in an initial installation of HP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, and v7.2.2 only follow steps 1 through Step 3 of the following procedure, before initiating an operating system deployment. To address the vulnerability in a previous installation of HP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, and v7.2.2 follow all steps in the following procedure. Delete the smhamd64-*.exe/smhx86-*.exe" from Component Copy Location listed in the following table, row 1,2,3,4. Delete the affected hpsmh-7.*.rpm" from Component Copy Location listed in the following table, row 5. In sequence, perform the steps from left to right in the following table. First, download components from Download Link; Second, rename the component as suggested in Rename to. Third, copy the component to the location suggested in Component Copy Location. Table Row Number Download Link Rename to Component Copy Location 1 http://www.hp.com/swpublishing/MTX-d1488fd987894bc4ab3fe0ef52 smhx86-cp023242.exe \\express\hpfeatures\hpagents-ws\components\Win2003 2 http://www.hp.com/swpublishing/MTX-4575754bbb614b58bf0ae1ac37 smhamd64-cp023243.exe \\express\hpfeatures\hpagents-ws\components\Win2003 3 http://www.hp.com/swpublishing/MTX-2e19c856f0e84e20a14c63ecd0 smhamd64-cp023240.exe \\express\hpfeatures\hpagents-ws\components\Win2008 4 http://www.hp.com/swpublishing/MTX-41199f68c1144acb84a5798bf0 smhx86-cp023239.exe \\express\hpfeatures\hpagents-ws\components\Win2008 5 http://www.hp.com/swpublishing/MTX-bfd3c0fb11184796b9428ced37 Do not rename the downloaded component for this step. \\express\hpfeatures\hpagents-sles11-x64\components \\express\hpfeatures\hpagents-sles10-x64\components \\express\hpfeatures\hpagents-rhel5-x64\components \\express\hpfeatures\hpagents-rhel6-x64\components Table 1 Initiate Install HP Management Agents for SLES 11 x64 on targets running SLES11 x64. Initiate Install HP Management Agents for SLES 10 x64 on targets running SLES10 x64. Initiate Install HP Management Agents for RHEL 6 x64 on targets running RHEL 6 x64. Initiate Install HP Management Agents for RHEL 5 x64 on targets running RHEL 5 x64. HP CloudSystem Foundation v8.02 is available at the following Software Depot download location: https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =Z7550-63210 Notes: The HP CloudSystem Foundation v8.02 also applies to HP CloudSystem Enterprise software. HP initially addressed this vulnerability by issuing update v8.01 on 30-April-2014. All other HP CloudSystem Foundation and HP CloudSystem Enterprise software download files remain at version 8.0. The combination of these files available at the link above makes up the overall CloudSystem solution. Customers who had downloaded a version of CloudSystem prior to this most recent update are encouraged to obtain the updated files from the Software Depot download location. HP recommends that customers with software support for HP CloudSystem Foundation or HP CloudSystem Enterprise, and have installed a version prior to v8.02, contact HP Technical Support to help determine the best method to proceed. OpenSSL is a 3rd party product that is embedded with some of HP Software products. This bulletin objective is to notify HP Software customers about products affected by the Heartbleed vulnerability. This weakness potentially allows disclosure of information protected, under normal conditions, by the SSL/TLS protocol. Each bulletin will include a patch and/or mitigation guideline. Note: OpenSSL is an external product embedded in HP products. Bulletin Applicability: This bulletin applies to each OpenSSL component that is embedded within the HP products listed in the security bulletin. The bulletin does not apply to any other 3rd party application (e.g. operating system, web server, or application server) that may be required to be installed by the customer according instructions in the product install guide. To learn more about HP Software Incident Response, please visit http://www8.h p.com/us/en/software-solutions/enterprise-software-security-center/response-c enter.html . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2014:123 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : tor Date : June 11, 2014 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Updated tor packages fix multiple vulnerabilities: Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for relay identity keys and hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors (CVE-2013-7295). Update to version 0.2.4.22 solves these major and security problems: - Block authority signing keys that were used on authorities vulnerable to the heartbleed bug in OpenSSL (CVE-2014-0160). - Fix a memory leak that could occur if a microdescriptor parse fails during the tokenizing step. - The relay ciphersuite list is now generated automatically based on uniform criteria, and includes all OpenSSL ciphersuites with acceptable strength and forward secrecy. - Relays now trust themselves to have a better view than clients of which TLS ciphersuites are better than others. - Clients now try to advertise the same list of ciphersuites as Firefox 28. For other changes see the upstream change log _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7295 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 http://advisories.mageia.org/MGASA-2014-0059.html http://advisories.mageia.org/MGASA-2014-0256.html _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: 77035fd2ff3c6df5effbaf9ee78bdaf4 mbs1/x86_64/tor-0.2.4.22-1.mbs1.x86_64.rpm cccaec1a8425ebfce0bb7d8057d38d6e mbs1/SRPMS/tor-0.2.4.22-1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFTmDAPmqjQ0CJFipgRAqq4AJ9ZIEn/fqUynENotuSA2kTLnKwpJgCgkh59 ssWQCdn4l3H2KyxX+IQBsxw= =fSis -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 CA20140413-01: Security Notice for OpenSSL Heartbleed Vulnerability Issued: April 13, 2014 Updated: May 12, 2014 CA Technologies is investigating an OpenSSL vulnerability, referred to as the "Heartbleed bug" that was publicly disclosed on April 7, 2014. CVE identifier CVE-2014-0160 has been assigned to this vulnerability. CA Technologies has confirmed that the majority of our product portfolio is unaffected. There are, however, several products that used vulnerable versions of OpenSSL 1.0.1 and consequently may be affected. CA Technologies will update this security notice as additional information becomes available. Risk Rating High These products may be affected CA ARCserve D2D for Windows 16.5 CA ARCserve D2D for Linux 16.5, 16.5SP1 CA ARCserve High Availability 16.5, 16.5SP1, 16.5SP2 (SP2 build less than 3800) CA ARCserve Replication 16.5, 16.5SP1, 16.5SP2 (SP2 build less than 3800) CA ARCserve Unified Data Protection (Release Candidate) CA ecoMeter 3.1.1, 3.1.2, 4.0.00, 4.0.01, 4.0.02, 4.1.00, 4.1.01, 4.2.00 CA eHealth 6.3.0.05 thru 6.3.2.04 (all platforms affected) CA Layer 7 API Gateway 8.1 (installed but not used by default) CA Layer 7 API Portal 2.6 CA Layer 7 Mobile Access Gateway 8.1 (installed but not used by default) CA Mobile Device Management 2014 Q1 CA XCOM Data Transport - Only the Windows 64-bit XCOM application is affected. Note: At this time, no other CA Technologies products have been identified as potentially vulnerable. Solution CA ARCserve D2D for Windows 16.5: Apply fix RO69431. CA ARCserve D2D for Linux 16.5 and 16.5SP1: Apply fix RO69417. Note that r16.5 SP1 is a prerequisite for this fix. CA ARCserve High Availability 16.5, 16.5SP1, 16.5SP2 (SP2 build less than 3800): Apply Service Pack 2 (build 3800), which includes the fix for the OpenSSL Heartbleed vulnerability: RI69547. CA ARCserve Replication 16.5, 16.5SP1, 16.5SP2 (SP2 build less than 3800): Apply Service Pack 2 (build 3800), which includes the fix for the OpenSSL Heartbleed vulnerability: RI69547. CA ARCserve Unified Data Protection (Release Candidate): CA expects to provide a solution with the GA release on May 14, 2014 CA ecoMeter 3.1.1, 3.1.2: These versions of CA ecoMeter use eHealth as the data collection platform. Apply the appropriate fix listed below. Important note: Do not apply this patch to CA eHealth releases prior to 6.3.0.05 and/or systems utilizing CAC. Customers who use eHealth with CAC should wait for further notification as the testing for that configuration has not been completed. Windows: RO69554 Linux: RO69556 Solaris: RO69555 CA ecoMeter 4.0.00, 4.0.01, 4.0.02, 4.1.00, 4.1.01, 4.2.00: These versions of CA ecoMeter use eHealth as the data collection platform. Apply the appropriate fix listed below. Important note: The current CA eHealth / CA SiteMinder integration is not compatible with release 6.3.1.02 thru 6.3.2.04. Do not apply this patch to CA eHealth released prior to 6.3.1.02 and/or system utilizing CAC. Customers who use eHealth with CAC should wait for further notification as the testing for that configuration has not been completed. Windows: RO69442 Linux: RO69443 Solaris: RO69444 CA eHealth 6.3.0.05 - 6.3.1.01 (all platforms): Apply the appropriate fix listed below. Important note: Do not apply this patch to CA eHealth releases prior to 6.3.0.05 and/or systems utilizing CAC. Customers who use eHealth with CAC should wait for further notification as the testing for that configuration has not been completed. Windows: RO69554 Linux: RO69556 Solaris: RO69555 CA eHealth 6.3.1.02 - 6.3.2.04 (all platforms): Apply the appropriate fix listed below. Important note: The current CA eHealth / CA SiteMinder integration is not compatible with release 6.3.1.02 thru 6.3.2.04. Do not apply this patch to CA eHealth released prior to 6.3.1.02 and/or system utilizing CAC. Customers who use eHealth with CAC should wait for further notification as the testing for that configuration has not been completed. Windows: RO69442 Linux: RO69443 Solaris: RO69444 CA Layer 7 API Gateway 8.1: Solution was delivered on April 10, 2014 Refer to the Layer 7 Technologies Support site for solution. CA Layer 7 API Portal 2.6: Solution was delivered on April 10, 2014 Refer to the Layer 7 Technologies Support site for solution. CA Layer 7 Mobile Access Gateway 8.1: Solution was delivered on April 10, 2014 Refer to the Layer 7 Technologies Support site for solution. CA Mobile Device Management 2014 Q1: Apply Hotfix 1: CA MDM 2014Q1 Hotfix 1 CA XCOM Data Transport (only Windows 64-bit platform is affected): Solution RO69230 was published on April 11, 2014 Workaround None References CVE-2014-0160 - OpenSSL Heartbleed vulnerability Change History v1.0: 2014-04-13, Initial Release v1.1: 2014-04-14, Updated Layer 7 affected products and solution. v1.2: 2014-04-14, Updated XCOM Data Transport affected product info. v1.3: 2014-04-19, Modified affected versions for ARCserve D2D for Windows, ARCserve High Availability, ARCserve Replication, eHealth. Added ecoMeter to affected products. Modified solutions for ARCserve D2D for Windows, ARCserve D2D for Linux, ARCserve High Availability, ARCserve Replication, eHealth. Added ecoMeter 3.x and 4.x solution information. Added fixes for eHealth 6.3.1.02 – 6.3.2.04, and ecoMeter 4.x. v1.4: 2014-04-24, Modified ARCserve RHA affected versions. Added solutions for ARCserve D2D (Windows and Linux), ARCserve RHA, ecoMeter, eHealth. v1.5: 2014-05-12, Added fix for MDM. Fixes are now available for all potentially affected CA products. If additional information is required, please contact CA Technologies Support at https://support.ca.com/ . If you discover a vulnerability in CA Technologies products, please report your findings to the CA Technologies Product Vulnerability Response Team at vuln@ca.com . PGP key: support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782 Security Notices https://support.ca.com/irj/portal/anonymous/phpsbpldgpg Regards, Ken Williams Director, Product Vulnerability Response Team CA Technologies | One CA Plaza | Islandia, NY 11749 | www.ca.com Ken.Williams@ca.com | vuln@ca.com Copyright © 2014 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. All other trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15238) Charset: utf-8 wj8DBQFTdhtEeSWR3+KUGYURAqHSAJ9DSbzijtuMxwyes6kJ21iJwHkXVQCZARiM GEWBqKGKzMXNkvtf/sUGm1Q= =C6WK -----END PGP SIGNATURE-----

Trust: 3.24

sources: NVD: CVE-2014-0160 // CERT/CC: VU#720951 // BID: 65604 // PACKETSTORM: 126109 // PACKETSTORM: 126605 // PACKETSTORM: 126323 // PACKETSTORM: 126285 // PACKETSTORM: 126054 // PACKETSTORM: 126417 // VULMON: CVE-2014-0160 // PACKETSTORM: 126944 // PACKETSTORM: 126464 // PACKETSTORM: 126644 // PACKETSTORM: 126208 // PACKETSTORM: 126790 // PACKETSTORM: 126358 // PACKETSTORM: 127069 // PACKETSTORM: 126705

AFFECTED PRODUCTS

vendor:mitelmodel:mivoicescope:eqversion:1.3.2.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:20

Trust: 1.0

vendor:intellianmodel:v60scope:eqversion:1.15

Trust: 1.0

vendor:riconmodel:s9922lscope:eqversion:16.10.3\(3794\)

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion:7.0

Trust: 1.0

vendor:mitelmodel:mivoicescope:eqversion:1.1.2.5

Trust: 1.0

vendor:redhatmodel:gluster storagescope:eqversion:2.1

Trust: 1.0

vendor:siemensmodel:application processing enginescope:eqversion:2.0

Trust: 1.0

vendor:intellianmodel:v100scope:eqversion:1.24

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.0.1g

Trust: 1.0

vendor:siemensmodel:simatic s7-1500scope:eqversion:1.5

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:12.3

Trust: 1.0

vendor:splunkmodel:splunkscope:gteversion:6.0.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:19

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.10

Trust: 1.0

vendor:mitelmodel:mivoicescope:eqversion:1.1.3.3

Trust: 1.0

vendor:broadcommodel:symantec messaging gatewayscope:eqversion:10.6.1

Trust: 1.0

vendor:redhatmodel:virtualizationscope:eqversion:6.0

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.1

Trust: 1.0

vendor:intellianmodel:v100scope:eqversion:1.20

Trust: 1.0

vendor:intellianmodel:v60scope:eqversion:1.25

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:13.10

Trust: 1.0

vendor:siemensmodel:cp 1543-1scope:eqversion:1.1

Trust: 1.0

vendor:siemensmodel:wincc open architecturescope:eqversion:3.12

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion:7.3.0.104

Trust: 1.0

vendor:splunkmodel:splunkscope:ltversion:6.0.3

Trust: 1.0

vendor:mitelmodel:mivoicescope:eqversion:1.2.0.11

Trust: 1.0

vendor:siemensmodel:elan-8.2scope:ltversion:8.3.3

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion:7.2

Trust: 1.0

vendor:redhatmodel:storagescope:eqversion:2.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.5

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:filezillamodel:serverscope:ltversion:0.9.44

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion:7.1

Trust: 1.0

vendor:siemensmodel:simatic s7-1500tscope:eqversion:1.5

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:6.0

Trust: 1.0

vendor:mitelmodel:mivoicescope:eqversion:1.4.0.102

Trust: 1.0

vendor:intellianmodel:v100scope:eqversion:1.21

Trust: 1.0

vendor:broadcommodel:symantec messaging gatewayscope:eqversion:10.6.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:6.5

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion:7.3

Trust: 1.0

vendor:amazonmodel: - scope: - version: -

Trust: 0.8

vendor:arch linuxmodel: - scope: - version: -

Trust: 0.8

vendor:arubamodel: - scope: - version: -

Trust: 0.8

vendor:attachmatemodel: - scope: - version: -

Trust: 0.8

vendor:bee waremodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:camodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:extrememodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:fedoramodel: - scope: - version: -

Trust: 0.8

vendor:fortinetmodel: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:global associatesmodel: - scope: - version: -

Trust: 0.8

vendor:googlemodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:hitachimodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:intelmodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mandriva s amodel: - scope: - version: -

Trust: 0.8

vendor:marklogicmodel: - scope: - version: -

Trust: 0.8

vendor:mcafeemodel: - scope: - version: -

Trust: 0.8

vendor:nvidiamodel: - scope: - version: -

Trust: 0.8

vendor:netbsdmodel: - scope: - version: -

Trust: 0.8

vendor:openbsdmodel: - scope: - version: -

Trust: 0.8

vendor:opensslmodel: - scope: - version: -

Trust: 0.8

vendor:openvpnmodel: - scope: - version: -

Trust: 0.8

vendor:oraclemodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:sophosmodel: - scope: - version: -

Trust: 0.8

vendor:symantecmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:unisysmodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:watchguardmodel: - scope: - version: -

Trust: 0.8

vendor:wind rivermodel: - scope: - version: -

Trust: 0.8

vendor:nginxmodel: - scope: - version: -

Trust: 0.8

vendor:opensusemodel: - scope: - version: -

Trust: 0.8

vendor:pfsensemodel: - scope: - version: -

Trust: 0.8

vendor:opensslmodel:opensslscope:eqversion:1.0.1c

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.1b

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.2

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.1f

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.1

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.1d

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.1a

Trust: 0.6

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.1.7

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.1.5

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:1.1

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.10

Trust: 0.3

vendor:rubymodel:on rails ruby on rails 3.1.0.rc5scope: - version: -

Trust: 0.3

vendor:susemodel:studio onsitescope:eqversion:1.3

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.0.3

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.8.4

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.14

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.2.12

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.2

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.2

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:neversion:3.2

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.2.4

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:1.2.7

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:1.2

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.12

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.1.11

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.17

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:3.0.1

Trust: 0.3

vendor:redhatmodel:cloudformsscope:eqversion:3.0

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.1.2

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.1

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.1.12

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.2.15

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.7.1

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.13

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.1

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:1.0

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.8.3

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.16

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.2.6

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.18

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.4

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:neversion:3.2.17

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.7

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.8.0

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.5.2

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.6

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.2.7

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.8

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:3.0

Trust: 0.3

vendor:opscodemodel:chefscope:neversion:11.1.3

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.20

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:3.1.2

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.5.1

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:3.1.1

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.1.6

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.1.4

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.1

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:3.1

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.6

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.5

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:3.1.3

Trust: 0.3

vendor:redhatmodel:software collections for rhelscope:eqversion:0

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.7.2

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.1.9

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.2.16

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:rubymodel:on rails ruby on rails 3.1.0.rc6scope: - version: -

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.1.8

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.11

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.0.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:12.3

Trust: 0.3

vendor:opscodemodel:chefscope:eqversion:11.1.2

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.3

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.0.19

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.2.13

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.2.11

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.2.8

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.2.10

Trust: 0.3

vendor:rubymodel:on rails ruby on railsscope:eqversion:3.2.2

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.8.2

Trust: 0.3

vendor:puppetlabsmodel:puppet enterprisescope:eqversion:2.7

Trust: 0.3

sources: CERT/CC: VU#720951 // BID: 65604 // CNNVD: CNNVD-201404-073 // NVD: CVE-2014-0160

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0160
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2014-0160
value: HIGH

Trust: 1.0

NVD: CVE-2014-0160
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201404-073
value: HIGH

Trust: 0.6

VULMON: CVE-2014-0160
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-0160
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2014-0160
severity: MEDIUM
baseScore: 5.0
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2014-0160
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

sources: CERT/CC: VU#720951 // VULMON: CVE-2014-0160 // CNNVD: CNNVD-201404-073 // NVD: CVE-2014-0160 // NVD: CVE-2014-0160

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.0

sources: NVD: CVE-2014-0160

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 127069 // CNNVD: CNNVD-201404-073

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201404-073

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#720951 // VULMON: CVE-2014-0160

PATCH

title:openssl-1.0.1gurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=49074

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2017/01/23/heartbleed_2017/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2014/04/24/apple_posts_updates_for_heartbleed_flaw_in_airport/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2014/04/11/hackers_hammering_heartbleed/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2014/04/09/heartbleed_vuln_analysis/

Trust: 0.2

title:Debian CVElist Bug Report Logs: CVE-2014-0160 heartbeat read overrun (heartbleed)url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=e4799ab8fe4804274ba2db4d65cd867b

Trust: 0.1

title:Debian Security Advisories: DSA-2896-1 openssl -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=264ec318be06a69e28012f62b2dc5bb7

Trust: 0.1

title:Ubuntu Security Notice: openssl vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2165-1

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2014-0160

Trust: 0.1

title:exploitsurl:https://github.com/vs4vijay/exploits

Trust: 0.1

title:VULNIXurl:https://github.com/El-Palomo/VULNIX

Trust: 0.1

title:openssl-heartbleed-fixurl:https://github.com/sammyfung/openssl-heartbleed-fix

Trust: 0.1

title:cve-2014-0160url:https://github.com/cved-sources/cve-2014-0160

Trust: 0.1

title:heartbleed_checkurl:https://github.com/ehoffmann-cp/heartbleed_check

Trust: 0.1

title:heartbleedurl:https://github.com/okrutnik420/heartbleed

Trust: 0.1

title:heartbleed-test.crxurl:https://github.com/iwaffles/heartbleed-test.crx

Trust: 0.1

title: - url:https://github.com/Maheshmaske111/te

Trust: 0.1

title:AradSocketurl:https://github.com/araditc/AradSocket

Trust: 0.1

title:sslscanurl:https://github.com/kaisenlinux/sslscan

Trust: 0.1

title:Springboard_Capstone_Projecturl:https://github.com/jonahwinninghoff/Springboard_Capstone_Project

Trust: 0.1

title: - url:https://github.com/MrE-Fog/heartbleeder

Trust: 0.1

title:buffer_overflow_exploiturl:https://github.com/olivamadrigal/buffer_overflow_exploit

Trust: 0.1

title: - url:https://github.com/ashrafulislamcs/Ubuntu-Server-Hardening

Trust: 0.1

title:insecure_projecturl:https://github.com/turtlesec-no/insecure_project

Trust: 0.1

title: - url:https://github.com/Maheshmaske111/ssl

Trust: 0.1

title: - url:https://github.com/H4R335HR/heartbleed

Trust: 0.1

title:nmap-scriptsurl:https://github.com/takeshixx/nmap-scripts

Trust: 0.1

title:knockbleedurl:https://github.com/siddolo/knockbleed

Trust: 0.1

title:heartbleed-masstesturl:https://github.com/musalbas/heartbleed-masstest

Trust: 0.1

title:HeartBleedDotNeturl:https://github.com/ShawInnes/HeartBleedDotNet

Trust: 0.1

title:heartbleed_test_openvpnurl:https://github.com/weisslj/heartbleed_test_openvpn

Trust: 0.1

title:paraffinurl:https://github.com/vmeurisse/paraffin

Trust: 0.1

title:sslscanurl:https://github.com/rbsec/sslscan

Trust: 0.1

title:Heartbleed_Dockerfile_with_Nginxurl:https://github.com/froyo75/Heartbleed_Dockerfile_with_Nginx

Trust: 0.1

title:heartbleed-bugurl:https://github.com/cldme/heartbleed-bug

Trust: 0.1

title: - url:https://github.com/H4CK3RT3CH/awesome-web-hacking

Trust: 0.1

title:Web-Hackingurl:https://github.com/adm0i/Web-Hacking

Trust: 0.1

title:cybersecurity-ethical-hackingurl:https://github.com/paulveillard/cybersecurity-ethical-hacking

Trust: 0.1

title:Lastest-Web-Hacking-Tools-vol-Iurl:https://github.com/SARATOGAMarine/Lastest-Web-Hacking-Tools-vol-I

Trust: 0.1

title:HTBValentineWriteupurl:https://github.com/zimmel15/HTBValentineWriteup

Trust: 0.1

title:heartbleed-pocurl:https://github.com/sensepost/heartbleed-poc

Trust: 0.1

title:CVE-2014-0160url:https://github.com/0x90/CVE-2014-0160

Trust: 0.1

title:Certified-Ethical-Hacker-Exam-CEH-v10url:https://github.com/Tung0801/Certified-Ethical-Hacker-Exam-CEH-v10

Trust: 0.1

title:cs558heartbleedurl:https://github.com/gkaptch1/cs558heartbleed

Trust: 0.1

title:HeartBleedurl:https://github.com/archaic-magnon/HeartBleed

Trust: 0.1

title: - url:https://github.com/undacmic/heartbleed-proof-of-concept

Trust: 0.1

title:openvpn-jookkurl:https://github.com/Jeypi04/openvpn-jookk

Trust: 0.1

title:Heartbleedurl:https://github.com/Saiprasad16/Heartbleed

Trust: 0.1

title: - url:https://github.com/KickFootCode/LoveYouALL

Trust: 0.1

title: - url:https://github.com/imesecan/LeakReducer-artifacts

Trust: 0.1

title: - url:https://github.com/TVernet/Kali-Tools-liste-et-description

Trust: 0.1

title: - url:https://github.com/k4u5h41/Heartbleed

Trust: 0.1

title: - url:https://github.com/ronaldogdm/Heartbleed

Trust: 0.1

title: - url:https://github.com/rochacbruno/my-awesome-stars

Trust: 0.1

title: - url:https://github.com/asadhasan73/temp_comp_sec

Trust: 0.1

title: - url:https://github.com/Aakaashzz/Heartbleed

Trust: 0.1

title:tls-channelurl:https://github.com/marianobarrios/tls-channel

Trust: 0.1

title:fuzzx_cpp_demourl:https://github.com/guardstrikelab/fuzzx_cpp_demo

Trust: 0.1

title: - url:https://github.com/Ppamo/recon_net_tools

Trust: 0.1

title:heatbleedingurl:https://github.com/idkqh7/heatbleeding

Trust: 0.1

title:HeartBleed-Vulnerability-Checkerurl:https://github.com/waqasjamal/HeartBleed-Vulnerability-Checker

Trust: 0.1

title:heartbleedurl:https://github.com/iSCInc/heartbleed

Trust: 0.1

title:heartbleed-dtlsurl:https://github.com/hreese/heartbleed-dtls

Trust: 0.1

title:heartbleedcheckerurl:https://github.com/roganartu/heartbleedchecker

Trust: 0.1

title:nmap-heartbleedurl:https://github.com/azet/nmap-heartbleed

Trust: 0.1

title:sslscanurl:https://github.com/delishen/sslscan

Trust: 0.1

title:web-hackingurl:https://github.com/hr-beast/web-hacking

Trust: 0.1

title: - url:https://github.com/Miss-Brain/Web-Application-Security

Trust: 0.1

title:web-hackingurl:https://github.com/Hemanthraju02/web-hacking

Trust: 0.1

title:awesome-web-hackingurl:https://github.com/QWERTSKIHACK/awesome-web-hacking

Trust: 0.1

title: - url:https://github.com/himera25/web-hacking-list

Trust: 0.1

title: - url:https://github.com/dorota-fiit/bp-Heartbleed-defense-game

Trust: 0.1

title: - url:https://github.com/Maheshmaske111/sslscan

Trust: 0.1

title:Heart-bleedurl:https://github.com/anonymouse327311/Heart-bleed

Trust: 0.1

title:goScanurl:https://github.com/stackviolator/goScan

Trust: 0.1

title:sec-tool-listurl:https://github.com/alphaSeclab/sec-tool-list

Trust: 0.1

title: - url:https://github.com/utensil/awesome-stars-test

Trust: 0.1

title:insecure-cplusplus-dojourl:https://github.com/patricia-gallardo/insecure-cplusplus-dojo

Trust: 0.1

title: - url:https://github.com/jubalh/awesome-package-maintainer

Trust: 0.1

title: - url:https://github.com/Elnatty/tryhackme_labs

Trust: 0.1

title: - url:https://github.com/hzuiw33/OpenSSL

Trust: 0.1

title:makeItBleedurl:https://github.com/mcampa/makeItBleed

Trust: 0.1

title:CVE-2014-0160-Chrome-Pluginurl:https://github.com/Xyl2k/CVE-2014-0160-Chrome-Plugin

Trust: 0.1

title:heartbleedfixer.comurl:https://github.com/reenhanced/heartbleedfixer.com

Trust: 0.1

title:CVE-2014-0160-Scannerurl:https://github.com/obayesshelton/CVE-2014-0160-Scanner

Trust: 0.1

title:openmagicurl:https://github.com/isgroup-srl/openmagic

Trust: 0.1

title:heartbleederurl:https://github.com/titanous/heartbleeder

Trust: 0.1

title:cardiac-arresturl:https://github.com/ah8r/cardiac-arrest

Trust: 0.1

title:heartbleed_openvpn_pocurl:https://github.com/tam7t/heartbleed_openvpn_poc

Trust: 0.1

title:docker-wheezy-with-heartbleedurl:https://github.com/simonswine/docker-wheezy-with-heartbleed

Trust: 0.1

title:docker-testsslurl:https://github.com/mbentley/docker-testssl

Trust: 0.1

title:heartbleedscannerurl:https://github.com/hybridus/heartbleedscanner

Trust: 0.1

title:HeartLeakurl:https://github.com/OffensivePython/HeartLeak

Trust: 0.1

title:HBLurl:https://github.com/ssc-oscar/HBL

Trust: 0.1

title:awesome-starsurl:https://github.com/utensil/awesome-stars

Trust: 0.1

title:SecurityTesting_web-hackingurl:https://github.com/mostakimur/SecurityTesting_web-hacking

Trust: 0.1

title:awesome-web-hackingurl:https://github.com/winterwolf32/awesome-web-hacking

Trust: 0.1

title:awesome-web-hacking-1url:https://github.com/winterwolf32/awesome-web-hacking-1

Trust: 0.1

title: - url:https://github.com/Mehedi-Babu/ethical_hacking_cyber

Trust: 0.1

title: - url:https://github.com/drakyanerlanggarizkiwardhana/awesome-web-hacking

Trust: 0.1

title:awesome-web-hackingurl:https://github.com/thanshurc/awesome-web-hacking

Trust: 0.1

title:hackurl:https://github.com/nvnpsplt/hack

Trust: 0.1

title:awesome-web-hackingurl:https://github.com/noname1007/awesome-web-hacking

Trust: 0.1

title: - url:https://github.com/ImranTheThirdEye/awesome-web-hacking

Trust: 0.1

title:web-hackingurl:https://github.com/Ondrik8/web-hacking

Trust: 0.1

title:CheckSSL-ciphersuiteurl:https://github.com/kal1gh0st/CheckSSL-ciphersuite

Trust: 0.1

title: - url:https://github.com/undacmic/HeartBleed-Demo

Trust: 0.1

title: - url:https://github.com/MrE-Fog/ssl-heartbleed.nse

Trust: 0.1

title:welivesecurityurl:https://www.welivesecurity.com/2015/08/03/worlds-biggest-bug-bounty-payouts/

Trust: 0.1

title:Threatposturl:https://threatpost.com/oracle-gives-heartbleed-update-patches-14-products/105576/

Trust: 0.1

sources: VULMON: CVE-2014-0160 // CNNVD: CNNVD-201404-073

EXTERNAL IDS

db:NVDid:CVE-2014-0160

Trust: 4.2

db:EXPLOIT-DBid:32745

Trust: 2.5

db:CERT/CCid:VU#720951

Trust: 2.5

db:SECUNIAid:57721

Trust: 1.7

db:SECUNIAid:59243

Trust: 1.7

db:SECUNIAid:57836

Trust: 1.7

db:SECUNIAid:57968

Trust: 1.7

db:SECUNIAid:59347

Trust: 1.7

db:SECUNIAid:57966

Trust: 1.7

db:SECUNIAid:57483

Trust: 1.7

db:SECUNIAid:57347

Trust: 1.7

db:SECUNIAid:59139

Trust: 1.7

db:SECTRACKid:1030079

Trust: 1.7

db:SECTRACKid:1030074

Trust: 1.7

db:SECTRACKid:1030081

Trust: 1.7

db:SECTRACKid:1030080

Trust: 1.7

db:SECTRACKid:1030026

Trust: 1.7

db:SECTRACKid:1030077

Trust: 1.7

db:SECTRACKid:1030082

Trust: 1.7

db:SECTRACKid:1030078

Trust: 1.7

db:BIDid:66690

Trust: 1.7

db:EXPLOIT-DBid:32764

Trust: 1.7

db:USCERTid:TA14-098A

Trust: 1.7

db:SIEMENSid:SSA-635659

Trust: 1.7

db:AUSCERTid:ESB-2022.0696

Trust: 0.6

db:AUSCERTid:ESB-2022.6296

Trust: 0.6

db:PACKETSTORMid:160655

Trust: 0.6

db:CNNVDid:CNNVD-201404-073

Trust: 0.6

db:BIDid:65604

Trust: 0.3

db:ICS CERTid:ICSA-14-135-02

Trust: 0.1

db:VULMONid:CVE-2014-0160

Trust: 0.1

db:PACKETSTORMid:126109

Trust: 0.1

db:PACKETSTORMid:126605

Trust: 0.1

db:PACKETSTORMid:126323

Trust: 0.1

db:PACKETSTORMid:126285

Trust: 0.1

db:PACKETSTORMid:126054

Trust: 0.1

db:PACKETSTORMid:126417

Trust: 0.1

db:PACKETSTORMid:126705

Trust: 0.1

db:PACKETSTORMid:126944

Trust: 0.1

db:PACKETSTORMid:126464

Trust: 0.1

db:PACKETSTORMid:126644

Trust: 0.1

db:PACKETSTORMid:126208

Trust: 0.1

db:PACKETSTORMid:126790

Trust: 0.1

db:PACKETSTORMid:126358

Trust: 0.1

db:PACKETSTORMid:127069

Trust: 0.1

sources: CERT/CC: VU#720951 // VULMON: CVE-2014-0160 // BID: 65604 // PACKETSTORM: 126109 // PACKETSTORM: 126605 // PACKETSTORM: 126323 // PACKETSTORM: 126285 // PACKETSTORM: 126054 // PACKETSTORM: 126417 // PACKETSTORM: 126705 // PACKETSTORM: 126944 // PACKETSTORM: 126464 // PACKETSTORM: 126644 // PACKETSTORM: 126208 // PACKETSTORM: 126790 // PACKETSTORM: 126358 // PACKETSTORM: 127069 // CNNVD: CNNVD-201404-073 // NVD: CVE-2014-0160

REFERENCES

url:http://rhn.redhat.com/errata/rhsa-2014-0376.html

Trust: 3.3

url:http://www.debian.org/security/2014/dsa-2896

Trust: 3.1

url:http://heartbleed.com/

Trust: 2.5

url:http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/

Trust: 2.5

url:https://www.cert.fi/en/reports/2014/vulnerability788210.html

Trust: 2.5

url:https://code.google.com/p/mod-spdy/issues/detail?id=85

Trust: 2.5

url:https://blog.torproject.org/blog/openssl-bug-cve-2014-0160

Trust: 2.5

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140409-heartbleed

Trust: 2.5

url:https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217

Trust: 2.5

url:http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html

Trust: 2.5

url:http://www.securityfocus.com/bid/66690

Trust: 2.3

url:http://www.vmware.com/security/advisories/vmsa-2014-0012.html

Trust: 2.3

url:http://support.citrix.com/article/ctx140605

Trust: 2.3

url:http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/

Trust: 2.0

url:http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/

Trust: 2.0

url:http://rhn.redhat.com/errata/rhsa-2014-0396.html

Trust: 1.8

url:http://rhn.redhat.com/errata/rhsa-2014-0377.html

Trust: 1.8

url:https://bugzilla.redhat.com/show_bug.cgi?id=1084875

Trust: 1.7

url:http://www.openssl.org/news/secadv_20140407.txt

Trust: 1.7

url:http://www.securitytracker.com/id/1030078

Trust: 1.7

url:http://seclists.org/fulldisclosure/2014/apr/109

Trust: 1.7

url:http://seclists.org/fulldisclosure/2014/apr/190

Trust: 1.7

url:https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-april/000184.html

Trust: 1.7

url:http://www.securitytracker.com/id/1030082

Trust: 1.7

url:http://secunia.com/advisories/57347

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139722163017074&w=2

Trust: 1.7

url:http://www.securitytracker.com/id/1030077

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21670161

Trust: 1.7

url:http://www.securitytracker.com/id/1030080

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2014-april/131221.html

Trust: 1.7

url:http://www.securitytracker.com/id/1030074

Trust: 1.7

url:http://seclists.org/fulldisclosure/2014/apr/90

Trust: 1.7

url:http://www.securitytracker.com/id/1030081

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2014-0378.html

Trust: 1.7

url:http://seclists.org/fulldisclosure/2014/apr/91

Trust: 1.7

url:http://secunia.com/advisories/57483

Trust: 1.7

url:http://www.splunk.com/view/sp-caaamb3

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2014-april/131291.html

Trust: 1.7

url:http://www.securitytracker.com/id/1030079

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html

Trust: 1.7

url:http://secunia.com/advisories/57721

Trust: 1.7

url:http://www.blackberry.com/btsc/kb35882

Trust: 1.7

url:http://www.securitytracker.com/id/1030026

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html

Trust: 1.7

url:http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/

Trust: 1.7

url:http://www.us-cert.gov/ncas/alerts/ta14-098a

Trust: 1.7

url:http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/

Trust: 1.7

url:http://secunia.com/advisories/57966

Trust: 1.7

url:http://www.f-secure.com/en/web/labs_global/fsc-2014-1

Trust: 1.7

url:http://seclists.org/fulldisclosure/2014/apr/173

Trust: 1.7

url:http://secunia.com/advisories/57968

Trust: 1.7

url:http://www.exploit-db.com/exploits/32745

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/720951

Trust: 1.7

url:http://www.exploit-db.com/exploits/32764

Trust: 1.7

url:http://secunia.com/advisories/57836

Trust: 1.7

url:https://gist.github.com/chapmajs/10473815

Trust: 1.7

url:http://cogentdatahub.com/releasenotes.html

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139905458328378&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139869891830365&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139889113431619&w=2

Trust: 1.7

url:http://public.support.unisys.com/common/public/vulnerability/nvd_detail_rpt.aspx?id=1

Trust: 1.7

url:http://www.kerio.com/support/kerio-control/release-history

Trust: 1.7

url:http://public.support.unisys.com/common/public/vulnerability/nvd_detail_rpt.aspx?id=3

Trust: 1.7

url:http://advisories.mageia.org/mgasa-2014-0165.html

Trust: 1.7

url:https://h20566.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay&spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c04260637-4%257cdoclocale%253den_us%257ccalledby%253dsearch_result&javax.portlet.begcachetok=com.vignette.cachetoken&javax.portlet.endcachetok=com.vignette.cachetoken

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=isg400001843

Trust: 1.7

url:https://filezilla-project.org/versions.php?type=server

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=isg400001841

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=141287864628122&w=2

Trust: 1.7

url:http://seclists.org/fulldisclosure/2014/dec/23

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=142660345230545&w=2

Trust: 1.7

url:http://www.websense.com/support/article/kbarticle/vulnerabilities-resolved-in-triton-apx-version-8-0

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:062

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139817727317190&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139757726426985&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139758572430452&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139905653828999&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139842151128341&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139905405728262&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139833395230364&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139824993005633&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139843768401936&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139905202427693&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139774054614965&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139889295732144&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139835815211508&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=140724451518351&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139808058921905&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139836085512508&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139869720529462&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139905868529690&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139765756720506&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=140015787404650&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139824923705461&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139757919027752&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139774703817488&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139905243827825&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=140075368411126&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139905295427946&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139835844111589&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139757819327350&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139817685517037&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139905351928096&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139817782017443&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=140752315422991&w=2

Trust: 1.7

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004661

Trust: 1.7

url:http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_release_notes.pdf

Trust: 1.7

url:http://www.apcmedia.com/salestools/sjhn-7rkgnm/sjhn-7rkgnm_r4_en.pdf

Trust: 1.7

url:http://secunia.com/advisories/59347

Trust: 1.7

url:http://secunia.com/advisories/59243

Trust: 1.7

url:http://secunia.com/advisories/59139

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html

Trust: 1.7

url:http://download.schneider-electric.com/files?p_doc_ref=sevd%202014-119-01

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2165-1

Trust: 1.7

url:http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html

Trust: 1.7

url:http://www.securityfocus.com/archive/1/534161/100/0/threaded

Trust: 1.7

url:https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008

Trust: 1.7

url:https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf

Trust: 1.7

url:https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-0160

Trust: 1.4

url:https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html

Trust: 1.1

url:http://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=96db9023b881d7cd9f379b0c154650d6c108e9a3

Trust: 1.1

url:https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3cdev.tomcat.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3cdev.tomcat.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3cdev.tomcat.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3cdev.tomcat.apache.org%3e

Trust: 1.1

url:https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=cve-2014-0160

Trust: 1.0

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.9

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.9

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.9

url:http://seclists.org/oss-sec/2014/q2/22

Trust: 0.8

url:http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=96db902

Trust: 0.8

url:https://tools.ietf.org/html/rfc6520

Trust: 0.8

url:http://www.openssl.org/news/openssl-1.0.1-notes.html

Trust: 0.8

url:http://www.hut3.net/blog/cns---networks-security/2014/04/14/bugs-in-heartbleed-detection-scripts-

Trust: 0.8

url:http://blog.cryptographyengineering.com/2014/04/attack-of-week-openssl-heartbleed.html

Trust: 0.8

url:http://xkcd.com/1354/

Trust: 0.8

url:http://www.exploit-db.com/exploits/32745/

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2014-0160

Trust: 0.8

url:http://www.ubuntu.com/usn/usn-2165-1/

Trust: 0.8

url:http://www.freshports.org/security/openssl/

Trust: 0.8

url:http://kb.bluecoat.com/index?page=content&id=sa79

Trust: 0.8

url:https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentid=

Trust: 0.8

url:http://learn.extremenetworks.com/rs/extreme/images/cert_vu%23720951_vulnerability_advisory_04_11_2014v2.pdf

Trust: 0.8

url:http://www.fortiguard.com/advisory/fg-ir-14-011/

Trust: 0.8

url:http://www.freebsd.org/security/advisories/freebsd-sa-14:06.openssl.asc

Trust: 0.8

url:http://www.gentoo.org/security/en/glsa/glsa-201404-07.xml

Trust: 0.8

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04239375

Trust: 0.8

url:http://www.hitachi.com/hirt/publications/hirt-pub14005/index.html

Trust: 0.8

url:http://www-01.ibm.com/support/docview.wss?&uid=swg21669774

Trust: 0.8

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00037&languageid=en-fr

Trust: 0.8

url:https://kb.juniper.net/jsa10623

Trust: 0.8

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10071

Trust: 0.8

url:http://mail-index.netbsd.org/security-announce/2014/04/08/msg000085.html

Trust: 0.8

url:http://ftp.openbsd.org/pub/openbsd/patches/5.3/common/014_openssl.patch

Trust: 0.8

url:http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.533622

Trust: 0.8

url:http://kb.vmware.com/kb/2076225

Trust: 0.8

url:https://support.windriver.com/

Trust: 0.8

url:http://blogs.technet.com/b/security/archive/2014/04/10/microsoft-devices-and-services-and-the-openssl-heartbleed-vulnerability.aspx

Trust: 0.8

url:https://forum.peplink.com/threads/3062-special-notice-on-openssl-heartbleed-vulnerability

Trust: 0.8

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk100173

Trust: 0.8

url:http://jpn.nec.com/security-info/av14-001.html

Trust: 0.8

url:https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@%3cdev.tomcat.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@%3cdev.tomcat.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@%3cdev.tomcat.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@%3cdev.tomcat.apache.org%3e

Trust: 0.6

url:http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96db9023b881d7cd9f379b0c154650d6c108e9a3

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0696

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6296

Trust: 0.6

url:https://packetstormsecurity.com/files/160655/heartbleed-attack.html

Trust: 0.6

url:http://puppetlabs.com/security/cve/cve-2014-0082

Trust: 0.3

url:http://weblog.rubyonrails.org/2014/2/18/rails_3_2_17_4_0_3_and_4_1_0_beta2_have_been_released/

Trust: 0.3

url:http://rubyonrails.org/

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2014-0306.html

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2014-0215.html

Trust: 0.3

url:https://www.suse.com/support/update/announcement/2014/suse-su-20140734-1.html

Trust: 0.3

url:http://www.hp.com/swpublishing/mtx-d1488fd987894bc4ab3fe0ef52

Trust: 0.3

url:http://www.hp.com/swpublishing/mtx-4575754bbb614b58bf0ae1ac37

Trust: 0.3

url:http://www.hp.com/swpublishing/mtx-bfd3c0fb11184796b9428ced37

Trust: 0.3

url:http://support.openview.hp.com/downloads.jsp

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2014-0160.html

Trust: 0.2

url:https://access.redhat.com/security/team/key/#package

Trust: 0.2

url:https://access.redhat.com/site/articles/11258

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:http://www.hp.com/swpublishing/mtx-37075daeead2433cb41b59ae76

Trust: 0.2

url:http://www.hp.com/swpublishing/mtx-27e03b2f9cd24e77adc9dba94a

Trust: 0.2

url:http://www8.h

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:http://seclists.org/fulldisclosure/2019/jan/42

Trust: 0.1

url:https://www.debian.org/security/./dsa-2896

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/oracle-gives-heartbleed-update-patches-14-products/105576/

Trust: 0.1

url:https://ics-cert.us-cert.gov/advisories/icsa-14-135-02

Trust: 0.1

url:https://usn.ubuntu.com/2165-1/

Trust: 0.1

url:https://access.redhat.com/site/support/policy/updates/rhev/

Trust: 0.1

url:https://access.redhat.com/site/documentation/en-us/red_hat_enterprise_linux/6/html/hypervisor_deployment_guide/chap-deployment_guide-upgrading_red_hat_enterprise_virtualization_hypervisors.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6450

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4353

Trust: 0.1

url:http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6449

Trust: 0.1

url:http://www.hp.com/swpublishing/mtx-3d92ccccf85f404e8ba36a8178

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:http://www.hp.com/swpublishing/mtx-41199f68c1144acb84a5798bf0

Trust: 0.1

url:http://www.hp.com/swpublishing/mtx-2e19c856f0e84e20a14c63ecd0

Trust: 0.1

url:https://support.ca.com/

Trust: 0.1

url:https://www.ca.com

Trust: 0.1

url:https://support.ca.com/irj/portal/anonymous/phpsbpldgpg

Trust: 0.1

url:http://h18013.www1.hp.com/products/servers/management/hpsim/download.html

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_n

Trust: 0.1

url:http://www.hp.com/go/insightupdates

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lrvug_00092

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lrlg_00051

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/pc_00299

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lranlsys_00074

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03305

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03329

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/pc_00296

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03307

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lrlg_00052

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03315

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03306

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lranlsys_00075

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03328

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03332

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lrvug_00094

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03316

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03304

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03333

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/km00843314/binary/sa_alert_

Trust: 0.1

url:http://www8.hp.com/us/en/software-so

Trust: 0.1

url:https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/p

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7295

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7295

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0059.html

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0256.html

Trust: 0.1

sources: CERT/CC: VU#720951 // VULMON: CVE-2014-0160 // BID: 65604 // PACKETSTORM: 126109 // PACKETSTORM: 126605 // PACKETSTORM: 126323 // PACKETSTORM: 126285 // PACKETSTORM: 126054 // PACKETSTORM: 126417 // PACKETSTORM: 126705 // PACKETSTORM: 126944 // PACKETSTORM: 126464 // PACKETSTORM: 126644 // PACKETSTORM: 126208 // PACKETSTORM: 126790 // PACKETSTORM: 126358 // PACKETSTORM: 127069 // CNNVD: CNNVD-201404-073 // NVD: CVE-2014-0160

CREDITS

HP

Trust: 0.9

sources: PACKETSTORM: 126605 // PACKETSTORM: 126323 // PACKETSTORM: 126417 // PACKETSTORM: 126944 // PACKETSTORM: 126464 // PACKETSTORM: 126644 // PACKETSTORM: 126208 // PACKETSTORM: 126790 // PACKETSTORM: 126358

SOURCES

db:CERT/CCid:VU#720951
db:VULMONid:CVE-2014-0160
db:BIDid:65604
db:PACKETSTORMid:126109
db:PACKETSTORMid:126605
db:PACKETSTORMid:126323
db:PACKETSTORMid:126285
db:PACKETSTORMid:126054
db:PACKETSTORMid:126417
db:PACKETSTORMid:126705
db:PACKETSTORMid:126944
db:PACKETSTORMid:126464
db:PACKETSTORMid:126644
db:PACKETSTORMid:126208
db:PACKETSTORMid:126790
db:PACKETSTORMid:126358
db:PACKETSTORMid:127069
db:CNNVDid:CNNVD-201404-073
db:NVDid:CVE-2014-0160

LAST UPDATE DATE

2026-02-19T21:43:10.691000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#720951date:2016-05-13T00:00:00
db:VULMONid:CVE-2014-0160date:2023-11-07T00:00:00
db:BIDid:65604date:2015-04-13T21:44:00
db:CNNVDid:CNNVD-201404-073date:2023-02-13T00:00:00
db:NVDid:CVE-2014-0160date:2025-10-22T01:15:53.233

SOURCES RELEASE DATE

db:CERT/CCid:VU#720951date:2014-04-08T00:00:00
db:VULMONid:CVE-2014-0160date:2014-04-07T00:00:00
db:BIDid:65604date:2014-02-18T00:00:00
db:PACKETSTORMid:126109date:2014-04-10T22:54:11
db:PACKETSTORMid:126605date:2014-05-13T18:24:00
db:PACKETSTORMid:126323date:2014-04-25T17:50:24
db:PACKETSTORMid:126285date:2014-04-23T21:26:11
db:PACKETSTORMid:126054date:2014-04-08T21:22:06
db:PACKETSTORMid:126417date:2014-05-01T02:16:33
db:PACKETSTORMid:126705date:2014-05-19T04:30:01
db:PACKETSTORMid:126944date:2014-06-05T20:10:50
db:PACKETSTORMid:126464date:2014-05-03T17:02:00
db:PACKETSTORMid:126644date:2014-05-16T04:40:57
db:PACKETSTORMid:126208date:2014-04-17T22:04:49
db:PACKETSTORMid:126790date:2014-05-24T13:22:00
db:PACKETSTORMid:126358date:2014-04-28T20:33:33
db:PACKETSTORMid:127069date:2014-06-12T13:43:49
db:CNNVDid:CNNVD-201404-073date:2014-04-09T00:00:00
db:NVDid:CVE-2014-0160date:2014-04-07T22:55:03.893