ID

VAR-201602-0272


CVE

CVE-2015-3197


TITLE

OpenSSL re-uses unsafe prime numbers in Diffie-Hellman protocol

Trust: 0.8

sources: CERT/CC: VU#257823

DESCRIPTION

ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions. OpenSSL may generate unsafe primes for use in the Diffie-Hellman protocol, which may lead to disclosure of enough information for an attacker to recover the private encryption key. Network traffic encrypted using an RSA-based SSL certificate may be decrypted if enough SSLv2 handshake data can be collected. This is known as the "DROWN" attack in the media. OpenSSL is prone to a security-bypass vulnerability. Successfully exploiting this issue may allow attackers to perform unauthorized actions. This may lead to other attacks. Cisco Unified Computing System Central Software is prone to an arbitrary command-execution vulnerability. An attacker can exploit this issue to execute system commands on the underlying operating system. This issue being tracked by Cisco Bug ID CSCut46961. OpenSSL Security Advisory [1st March 2016] ========================================= NOTE: With this update, OpenSSL is disabling the SSLv2 protocol by default, as well as removing SSLv2 EXPORT ciphers. We strongly advise against the use of SSLv2 due not only to the issues described below, but to the other known deficiencies in the protocol as described at https://tools.ietf.org/html/rfc6176 Cross-protocol attack on TLS using SSLv2 (DROWN) (CVE-2016-0800) ================================================================ Severity: High A cross-protocol attack was discovered that could lead to decryption of TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites as a Bleichenbacher RSA padding oracle. Note that traffic between clients and non-vulnerable servers can be decrypted provided another server supporting SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP or POP) shares the RSA keys of the non-vulnerable server. Recovering one session key requires the attacker to perform approximately 2^50 computation, as well as thousands of connections to the affected server. A more efficient variant of the DROWN attack exists against unpatched OpenSSL servers using versions that predate 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf released on 19/Mar/2015 (see CVE-2016-0703 below). Users can avoid this issue by disabling the SSLv2 protocol in all their SSL/TLS servers, if they've not done so already. Disabling all SSLv2 ciphers is also sufficient, provided the patches for CVE-2015-3197 (fixed in OpenSSL 1.0.1r and 1.0.2f) have been deployed. Servers that have not disabled the SSLv2 protocol, and are not patched for CVE-2015-3197 are vulnerable to DROWN even if all SSLv2 ciphers are nominally disabled, because malicious clients can force the use of SSLv2 with EXPORT ciphers. OpenSSL 1.0.2g and 1.0.1s deploy the following mitigation against DROWN: SSLv2 is now by default disabled at build-time. Builds that are not configured with "enable-ssl2" will not support SSLv2. Even if "enable-ssl2" is used, users who want to negotiate SSLv2 via the version-flexible SSLv23_method() will need to explicitly call either of: SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv2); or SSL_clear_options(ssl, SSL_OP_NO_SSLv2); as appropriate. Even if either of those is used, or the application explicitly uses the version-specific SSLv2_method() or its client or server variants, SSLv2 ciphers vulnerable to exhaustive search key recovery have been removed. Specifically, the SSLv2 40-bit EXPORT ciphers, and SSLv2 56-bit DES are no longer available. In addition, weak ciphers in SSLv3 and up are now disabled in default builds of OpenSSL. Builds that are not configured with "enable-weak-ssl-ciphers" will not provide any "EXPORT" or "LOW" strength ciphers. OpenSSL 1.0.2 users should upgrade to 1.0.2g OpenSSL 1.0.1 users should upgrade to 1.0.1s This issue was reported to OpenSSL on December 29th 2015 by Nimrod Aviram and Sebastian Schinzel. The fix was developed by Viktor Dukhovni and Matt Caswell of OpenSSL. Double-free in DSA code (CVE-2016-0705) ======================================= Severity: Low A double free bug was discovered when OpenSSL parses malformed DSA private keys and could lead to a DoS attack or memory corruption for applications that receive DSA private keys from untrusted sources. This scenario is considered rare. This issue affects OpenSSL versions 1.0.2 and 1.0.1. OpenSSL 1.0.2 users should upgrade to 1.0.2g OpenSSL 1.0.1 users should upgrade to 1.0.1s This issue was reported to OpenSSL on February 7th 2016 by Adam Langley (Google/BoringSSL) using libFuzzer. The fix was developed by Dr Stephen Henson of OpenSSL. Memory leak in SRP database lookups (CVE-2016-0798) =================================================== Severity: Low The SRP user database lookup method SRP_VBASE_get_by_user had confusing memory management semantics; the returned pointer was sometimes newly allocated, and sometimes owned by the callee. The calling code has no way of distinguishing these two cases. Specifically, SRP servers that configure a secret seed to hide valid login information are vulnerable to a memory leak: an attacker connecting with an invalid username can cause a memory leak of around 300 bytes per connection. Servers that do not configure SRP, or configure SRP but do not configure a seed are not vulnerable. In Apache, the seed directive is known as SSLSRPUnknownUserSeed. To mitigate the memory leak, the seed handling in SRP_VBASE_get_by_user is now disabled even if the user has configured a seed. Applications are advised to migrate to SRP_VBASE_get1_by_user. However, note that OpenSSL makes no strong guarantees about the indistinguishability of valid and invalid logins. In particular, computations are currently not carried out in constant time. This issue affects OpenSSL versions 1.0.2 and 1.0.1. OpenSSL 1.0.2 users should upgrade to 1.0.2g OpenSSL 1.0.1 users should upgrade to 1.0.1s This issue was discovered on February 23rd 2016 by Emilia Käsper of the OpenSSL development team. Emilia Käsper also developed the fix. BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (CVE-2016-0797) ====================================================================== Severity: Low In the BN_hex2bn function the number of hex digits is calculated using an int value |i|. Later |bn_expand| is called with a value of |i * 4|. For large values of |i| this can result in |bn_expand| not allocating any memory because |i * 4| is negative. This can leave the internal BIGNUM data field as NULL leading to a subsequent NULL ptr deref. For very large values of |i|, the calculation |i * 4| could be a positive value smaller than |i|. In this case memory is allocated to the internal BIGNUM data field, but it is insufficiently sized leading to heap corruption. A similar issue exists in BN_dec2bn. This could have security consequences if BN_hex2bn/BN_dec2bn is ever called by user applications with very large untrusted hex/dec data. This is anticipated to be a rare occurrence. All OpenSSL internal usage of these functions use data that is not expected to be untrusted, e.g. config file data or application command line arguments. If user developed applications generate config file data based on untrusted data then it is possible that this could also lead to security consequences. This is also anticipated to be rare. This issue affects OpenSSL versions 1.0.2 and 1.0.1. OpenSSL 1.0.2 users should upgrade to 1.0.2g OpenSSL 1.0.1 users should upgrade to 1.0.1s This issue was reported to OpenSSL on February 19th 2016 by Guido Vranken. The fix was developed by Matt Caswell of the OpenSSL development team. Fix memory issues in BIO_*printf functions (CVE-2016-0799) ========================================================== Severity: Low The internal |fmtstr| function used in processing a "%s" format string in the BIO_*printf functions could overflow while calculating the length of a string and cause an OOB read when printing very long strings. Additionally the internal |doapr_outch| function can attempt to write to an OOB memory location (at an offset from the NULL pointer) in the event of a memory allocation failure. In 1.0.2 and below this could be caused where the size of a buffer to be allocated is greater than INT_MAX. E.g. this could be in processing a very long "%s" format string. Memory leaks can also occur. The first issue may mask the second issue dependent on compiler behaviour. These problems could enable attacks where large amounts of untrusted data is passed to the BIO_*printf functions. If applications use these functions in this way then they could be vulnerable. OpenSSL itself uses these functions when printing out human-readable dumps of ASN.1 data. Therefore applications that print this data could be vulnerable if the data is from untrusted sources. OpenSSL command line applications could also be vulnerable where they print out ASN.1 data, or if untrusted data is passed as command line arguments. Libssl is not considered directly vulnerable. Additionally certificates etc received via remote connections via libssl are also unlikely to be able to trigger these issues because of message size limits enforced within libssl. This issue affects OpenSSL versions 1.0.2 and 1.0.1. OpenSSL 1.0.2 users should upgrade to 1.0.2g OpenSSL 1.0.1 users should upgrade to 1.0.1s This issue was reported to OpenSSL on February 23rd by Guido Vranken. The fix was developed by Matt Caswell of the OpenSSL development team. Side channel attack on modular exponentiation (CVE-2016-0702) ============================================================= Severity: Low A side-channel attack was found which makes use of cache-bank conflicts on the Intel Sandy-Bridge microarchitecture which could lead to the recovery of RSA keys. The ability to exploit this issue is limited as it relies on an attacker who has control of code in a thread running on the same hyper-threaded core as the victim thread which is performing decryptions. This issue affects OpenSSL versions 1.0.2 and 1.0.1. OpenSSL 1.0.2 users should upgrade to 1.0.2g OpenSSL 1.0.1 users should upgrade to 1.0.1s This issue was reported to OpenSSL on Jan 8th 2016 by Yuval Yarom, The University of Adelaide and NICTA, Daniel Genkin, Technion and Tel Aviv University, and Nadia Heninger, University of Pennsylvania with more information at http://cachebleed.info. The fix was developed by Andy Polyakov of OpenSSL. Divide-and-conquer session key recovery in SSLv2 (CVE-2016-0703) ================================================================ Severity: High This issue only affected versions of OpenSSL prior to March 19th 2015 at which time the code was refactored to address vulnerability CVE-2015-0293. s2_srvr.c did not enforce that clear-key-length is 0 for non-export ciphers. If clear-key bytes are present for these ciphers, they *displace* encrypted-key bytes. This leads to an efficient divide-and-conquer key recovery attack: if an eavesdropper has intercepted an SSLv2 handshake, they can use the server as an oracle to determine the SSLv2 master-key, using only 16 connections to the server and negligible computation. More importantly, this leads to a more efficient version of DROWN that is effective against non-export ciphersuites, and requires no significant computation. This issue affected OpenSSL versions 1.0.2, 1.0.1l, 1.0.0q, 0.9.8ze and all earlier versions. It was fixed in OpenSSL 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf (released March 19th 2015). This issue was reported to OpenSSL on February 10th 2016 by David Adrian and J. Alex Halderman of the University of Michigan. The underlying defect had by then already been fixed by Emilia Käsper of OpenSSL on March 4th 2015. The fix for this issue can be identified by commits ae50d827 (1.0.2a), cd56a08d (1.0.1m), 1a08063 (1.0.0r) and 65c588c (0.9.8zf). Bleichenbacher oracle in SSLv2 (CVE-2016-0704) ============================================== Severity: Moderate This issue only affected versions of OpenSSL prior to March 19th 2015 at which time the code was refactored to address the vulnerability CVE-2015-0293. s2_srvr.c overwrite the wrong bytes in the master-key when applying Bleichenbacher protection for export cipher suites. This provides a Bleichenbacher oracle, and could potentially allow more efficient variants of the DROWN attack. This issue affected OpenSSL versions 1.0.2, 1.0.1l, 1.0.0q, 0.9.8ze and all earlier versions. It was fixed in OpenSSL 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf (released March 19th 2015). This issue was reported to OpenSSL on February 10th 2016 by David Adrian and J. Alex Halderman of the University of Michigan. The underlying defect had by then already been fixed by Emilia Käsper of OpenSSL on March 4th 2015. The fix for this issue can be identified by commits ae50d827 (1.0.2a), cd56a08d (1.0.1m), 1a08063 (1.0.0r) and 65c588c (0.9.8zf). Note ==== As per our previous announcements and our Release Strategy (https://www.openssl.org/policies/releasestrat.html), support for OpenSSL version 1.0.1 will cease on 31st December 2016. No security updates for that version will be provided after that date. Users of 1.0.1 are advised to upgrade. Support for versions 0.9.8 and 1.0.0 ended on 31st December 2015. Those versions are no longer receiving security updates. References ========== URL for this Security Advisory: https://www.openssl.org/news/secadv/20160301.txt Note: the online version of the advisory may be updated with additional details over time. For details of OpenSSL severity classifications please see: https://www.openssl.org/policies/secpolicy.html . DH small subgroups (CVE-2016-0701) ================================== Severity: High Historically OpenSSL usually only ever generated DH parameters based on "safe" primes. More recently (in version 1.0.2) support was provided for generating X9.42 style parameter files such as those required for RFC 5114 support. The primes used in such files may not be "safe". Where an application is using DH configured with parameters based on primes that are not "safe" then an attacker could use this fact to find a peer's private DH exponent. This attack requires that the attacker complete multiple handshakes in which the peer uses the same private DH exponent. For example this could be used to discover a TLS server's private DH exponent if it's reusing the private DH exponent or it's using a static DH ciphersuite. OpenSSL provides the option SSL_OP_SINGLE_DH_USE for ephemeral DH (DHE) in TLS. It is not on by default. If the option is not set then the server reuses the same private DH exponent for the life of the server process and would be vulnerable to this attack. It is believed that many popular applications do set this option and would therefore not be at risk. OpenSSL before 1.0.2f will reuse the key if: - SSL_CTX_set_tmp_dh()/SSL_set_tmp_dh() is used and SSL_OP_SINGLE_DH_USE is not set. - SSL_CTX_set_tmp_dh_callback()/SSL_set_tmp_dh_callback() is used, and both the parameters and the key are set and SSL_OP_SINGLE_DH_USE is not used. This is an undocumted feature and parameter files don't contain the key. - Static DH ciphersuites are used. The key is part of the certificate and so it will always reuse it. This is only supported in 1.0.2. It will not reuse the key for DHE ciphers suites if: - SSL_OP_SINGLE_DH_USE is set - SSL_CTX_set_tmp_dh_callback()/SSL_set_tmp_dh_callback() is used and the callback does not provide the key, only the parameters. The callback is almost always used like this. Non-safe primes are generated by OpenSSL when using: - genpkey with the dh_rfc5114 option. This will write an X9.42 style file including the prime-order subgroup size "q". This is supported since the 1.0.2 version. Older versions can't read files generated in this way. - dhparam with the -dsaparam option. This has always been documented as requiring the single use. The fix for this issue adds an additional check where a "q" parameter is available (as is the case in X9.42 based parameters). This detects the only known attack, and is the only possible defense for static DH ciphersuites. This could have some performance impact. Additionally the SSL_OP_SINGLE_DH_USE option has been switched on by default and cannot be disabled. This could have some performance impact. It is possible to generate parameters using non "safe" primes, but this option has always been documented as requiring single use and is not the default or believed to be common. However, as a precaution, the SSL_OP_SINGLE_DH_USE change has also been backported to 1.0.1r. An update on DHE man-in-the-middle protection (Logjam) ==================================================================== A previously published vulnerability in the TLS protocol allows a man-in-the-middle attacker to downgrade vulnerable TLS connections using ephemeral Diffie-Hellman key exchange to 512-bit export-grade cryptography. OpenSSL added Logjam mitigation for TLS clients by rejecting handshakes with DH parameters shorter than 768 bits in releases 1.0.2b and 1.0.1n. This limit has been increased to 1024 bits in this release, to offer stronger cryptographic assurance for all TLS connections using ephemeral Diffie-Hellman key exchange. Relevant releases/architectures: RHEL 7-based RHEV-H - noarch RHEV Hypervisor for RHEL-6 - noarch 3. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. Changes to the rhev-hypervisor component: * Previously, a race between services during boot prevented network configuration from upgrading correctly. The risk for the race has now been reduced significantly to allow the upgrade of the network configuration to complete correctly. (BZ#1194068) * Previously, using the text user interface (TUI) to log in to the administrator account of Red Hat Enterprise Virtualization Hypervisor failed with a Python backtrace. This update makes the "six" module correctly importable under all circumstances, which ensures that logging in to Red Hat Enterprise Virtualization Hypervisor using TUI proceeds as expected. (BZ#1246836) 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05390893 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05390893 Version: 1 HPESBHF03703 rev.1 - HPE Network Products including Comware v7 and VCX using OpenSSL, Remote Unauthorized Disclosure of Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2017-02-14 Last Updated: 2017-02-14 Potential Security Impact: Remote: Unauthorized Disclosure of Information Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities with OpenSSL have been addressed in HPE Network Products including Comware v7 and VCX. The vulnerabilities could be remotely exploited resulting in disclosure of information. References: - CVE-2015-3197 - OpenSSL, Remote unauthorized disclosure of information - CVE-2016-0701 - OpenSSL, Remote unauthorized disclosure of information SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Please refer to the RESOLUTION below for a list of updated products. Please refer to the RESOLUTION below for a list of updated products. BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2015-3197 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N) CVE-2016-0701 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N 2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has made the following software updates to resolve the vulnerability in the Comware v7 and VCX products. **COMWARE 7 Products** + **12500 (Comware 7) - Version: R7377P01** * HP Network Products - JC072B HP 12500 Main Processing Unit - JC085A HP A12518 Switch Chassis - JC086A HP A12508 Switch Chassis - JC652A HP 12508 DC Switch Chassis - JC653A HP 12518 DC Switch Chassis - JC654A HP 12504 AC Switch Chassis - JC655A HP 12504 DC Switch Chassis - JF430A HP A12518 Switch Chassis - JF430B HP 12518 Switch Chassis - JF430C HP 12518 AC Switch Chassis - JF431A HP A12508 Switch Chassis - JF431B HP 12508 Switch Chassis - JF431C HP 12508 AC Switch Chassis - JG497A HP 12500 MPU w/Comware V7 OS - JG782A HP FF 12508E AC Switch Chassis - JG783A HP FF 12508E DC Switch Chassis - JG784A HP FF 12518E AC Switch Chassis - JG785A HP FF 12518E DC Switch Chassis - JG802A HP FF 12500E MPU * CVEs - CVE-2015-3197 - CVE-2016-0701 + **10500 (Comware 7) - Version: R7183** * HP Network Products - JC611A HP 10508-V Switch Chassis - JC612A HP 10508 Switch Chassis - JC613A HP 10504 Switch Chassis - JC748A HP 10512 Switch Chassis - JG608A HP FlexFabric 11908-V Switch Chassis - JG609A HP FlexFabric 11900 Main Processing Unit - JG820A HP 10504 TAA Switch Chassis - JG821A HP 10508 TAA Switch Chassis - JG822A HP 10508-V TAA Switch Chassis - JG823A HP 10512 TAA Switch Chassis - JG496A HP 10500 Type A MPU w/Comware v7 OS - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating System - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System Main Processing Unit * CVEs - CVE-2015-3197 - CVE-2016-0701 + **12900 (Comware 7) - Version: R1150** * HP Network Products - JG619A HP FlexFabric 12910 Switch AC Chassis - JG621A HP FlexFabric 12910 Main Processing Unit - JG632A HP FlexFabric 12916 Switch AC Chassis - JG634A HP FlexFabric 12916 Main Processing Unit - JH104A HP FlexFabric 12900E Main Processing Unit - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit - JH263A HP FlexFabric 12904E Main Processing Unit - JH255A HP FlexFabric 12908E Switch Chassis - JH262A HP FlexFabric 12904E Switch Chassis - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis - JH103A HP FlexFabric 12916E Switch Chassis * CVEs - CVE-2015-3197 - CVE-2016-0701 + **5900 (Comware 7) - Version: R2432P01** * HP Network Products - JC772A HP 5900AF-48XG-4QSFP+ Switch - JG296A HP 5920AF-24XG Switch - JG336A HP 5900AF-48XGT-4QSFP+ Switch - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch - JG555A HP 5920AF-24XG TAA Switch - JG838A HP FF 5900CP-48XG-4QSFP+ Switch - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch - JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant * CVEs - CVE-2015-3197 - CVE-2016-0701 + **MSR1000 (Comware 7) - Version: R0306P30** * HP Network Products - JG875A HP MSR1002-4 AC Router - JH060A HP MSR1003-8S AC Router * CVEs - CVE-2015-3197 - CVE-2016-0701 + **MSR2000 (Comware 7) - Version: R0306P30** * HP Network Products - JG411A HP MSR2003 AC Router - JG734A HP MSR2004-24 AC Router - JG735A HP MSR2004-48 Router - JG866A HP MSR2003 TAA-compliant AC Router * CVEs - CVE-2015-3197 - CVE-2016-0701 + **MSR3000 (Comware 7) - Version: R0306P30** * HP Network Products - JG404A HP MSR3064 Router - JG405A HP MSR3044 Router - JG406A HP MSR3024 AC Router - JG409A HP MSR3012 AC Router - JG409B HPE MSR3012 AC Router - JG861A HP MSR3024 TAA-compliant AC Router * CVEs - CVE-2015-3197 - CVE-2016-0701 + **MSR4000 (Comware 7) - Version: R0306P30** * HP Network Products - JG402A HP MSR4080 Router Chassis - JG403A HP MSR4060 Router Chassis - JG412A HP MSR4000 MPU-100 Main Processing Unit - JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit * CVEs - CVE-2015-3197 - CVE-2016-0701 + **MSR95X - Version: R0306P30** * HP Network Products - JH296A HPE MSR954 1GbE SFP 2GbE-WAN 4GbE-LAN CWv7 Router - JH297A HPE MSR954-W 1GbE SFP (WW) 2GbE-WAN 4GbE-LAN Wireless 802.11n CWv7 Router - JH298A HPE MSR954-W 1GbE SFP LTE (AM) 2GbE-WAN 4GbE-LAN Wireless 802.11n CWv7 Router - JH299A HPE MSR954-W 1GbE SFP LTE (WW) 2GbE-WAN 4GbE-LAN Wireless 802.11n CWv7 Router * CVEs - CVE-2015-3197 - CVE-2016-0701 + **VSR (Comware 7) - Version: E0322P01** * HP Network Products - JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software - JG811AAE HP VSR1001 Comware 7 Virtual Services Router - JG812AAE HP VSR1004 Comware 7 Virtual Services Router - JG813AAE HP VSR1008 Comware 7 Virtual Services Router * CVEs - CVE-2015-3197 - CVE-2016-0701 + **7900 (Comware 7) - Version: R2150** * HP Network Products - JG682A HP FlexFabric 7904 Switch Chassis - JG841A HP FlexFabric 7910 Switch Chassis - JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit - JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit - JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis - JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis - JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main Processing Unit - JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main Processing Unit * CVEs - CVE-2015-3197 - CVE-2016-0701 + **5130EI (Comware 7) - Version: R3113P02** * HP Network Products - JG932A HP 5130-24G-4SFP+ EI Switch - JG933A HP 5130-24G-SFP-4SFP+ EI Switch - JG934A HP 5130-48G-4SFP+ EI Switch - JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch - JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch - JG938A HP 5130-24G-2SFP+-2XGT EI Switch - JG939A HP 5130-48G-2SFP+-2XGT EI Switch - JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch - JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch - JG975A HP 5130-24G-4SFP+ EI Brazil Switch - JG976A HP 5130-48G-4SFP+ EI Brazil Switch - JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch - JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch * CVEs - CVE-2015-3197 - CVE-2016-0701 + **6125XLG - Version: R2432P01** * HP Network Products - 711307-B21 HP 6125XLG Blade Switch - 737230-B21 HP 6125XLG Blade Switch with TAA * CVEs - CVE-2015-3197 - CVE-2016-0701 + **6127XLG - Version: R2432P01** * HP Network Products - 787635-B21 HP 6127XLG Blade Switch Opt Kit - 787635-B22 HP 6127XLG Blade Switch with TAA * CVEs - CVE-2015-3197 - CVE-2016-0701 + **Moonshot - Version: R2432P01** * HP Network Products - 786617-B21 - HP Moonshot-45Gc Switch Module - 704654-B21 - HP Moonshot-45XGc Switch Module - 786619-B21 - HP Moonshot-180XGc Switch Module * CVEs - CVE-2015-3197 - CVE-2016-0701 + **5700 (Comware 7) - Version: R2432P01** * HP Network Products - JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch - JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch - JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch - JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch - JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch - JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch * CVEs - CVE-2015-3197 - CVE-2016-0701 + **5930 (Comware 7) - Version: R2432P01** * HP Network Products - JG726A HP FlexFabric 5930 32QSFP+ Switch - JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch - JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch - JH179A HP FlexFabric 5930 4-slot Switch - JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch - JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch * CVEs - CVE-2015-3197 - CVE-2016-0701 + **1950 (Comware 7) - Version: R3113P02** * HP Network Products - JG960A HP 1950-24G-4XG Switch - JG961A HP 1950-48G-2SFP+-2XGT Switch - JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch - JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch * CVEs - CVE-2015-3197 - CVE-2016-0701 + **7500 (Comware 7) - Version: R7183** * HP Network Products - JD238C HP 7510 Switch Chassis - JD239C HP 7506 Switch Chassis - JD240C HP 7503 Switch Chassis - JD242C HP 7502 Switch Chassis - JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only Main Processing Unit - JH208A HP 7502 Main Processing Unit - JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port 40GbE QSFP+ Main Processing Unit * CVEs - CVE-2015-3197 - CVE-2016-0701 + **5130HI - Version: R1120P07** * HP Network Products - JH323A HPE 5130 24G 4SFP+ 1-slot HI Switch - JH324A HPE 5130 48G 4SFP+ 1-slot HI Switch - JH325A HPE 5130 24G PoE+ 4SFP+ 1-slot HI Switch - JH326A HPE 5130 48G PoE+ 4SFP+ 1-slot HI Switch * CVEs - CVE-2015-3197 - CVE-2016-0701 + **5510HI - Version: R1120P07** * HP Network Products - JH145A HPE 5510 24G 4SFP+ HI 1-slot Switch - JH146A HPE 5510 48G 4SFP+ HI 1-slot Switch - JH147A HPE 5510 24G PoE+ 4SFP+ HI 1-slot Switch - JH148A HPE 5510 48G PoE+ 4SFP+ HI 1-slot Switch - JH149A HPE 5510 24G SFP 4SFP+ HI 1-slot Switch * CVEs - CVE-2015-3197 - CVE-2016-0701 + **VCX - Version: 9.8.19** * HP Network Products - J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr - J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr - JC517A HP VCX V7205 Platform w/DL 360 G6 Server - JE355A HP VCX V6000 Branch Platform 9.0 - JC516A HP VCX V7005 Platform w/DL 120 G6 Server - JC518A HP VCX Connect 200 Primry 120 G6 Server - J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr - JE341A HP VCX Connect 100 Secondary - JE252A HP VCX Connect Primary MIM Module - JE253A HP VCX Connect Secondary MIM Module - JE254A HP VCX Branch MIM Module - JE355A HP VCX V6000 Branch Platform 9.0 - JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod - JD023A HP MSR30-40 Router with VCX MIM Module - JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM - JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod - JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod - JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod - JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS - JE340A HP VCX Connect 100 Pri Server 9.0 - JE342A HP VCX Connect 100 Sec Server 9.0 * CVEs - CVE-2015-3197 **Note:** Please contact HPE Technical Support if any assistance is needed acquiring the software updates. HISTORY Version:1 (rev.1) - 14 February 2017 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. 5.9 server) - i386, ia64, x86_64 3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201601-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: January 29, 2016 Bugs: #572854 ID: 201601-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in OpenSSL, allowing remote attackers to disclose sensitive information and complete weak handshakes. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/openssl < 1.0.2f >= 1.0.2f Description =========== Multiple vulnerabilities have been discovered in OpenSSL. Please review the upstream advisory and CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All OpenSSL users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.2f" References ========== [ 1 ] CVE-2015-3197 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3197 [ 2 ] CVE-2016-0701 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0701 [ 3 ] OpenSSL Security Advisory [28th Jan 2016] http://openssl.org/news/secadv/20160128.txt Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201601-05 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: openssl security update Advisory ID: RHSA-2016:0301-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0301.html Issue date: 2016-03-01 CVE Names: CVE-2015-3197 CVE-2016-0702 CVE-2016-0705 CVE-2016-0797 CVE-2016-0800 ===================================================================== 1. Summary: Updated openssl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker can potentially use this flaw to decrypt RSA-encrypted cipher text from a connection using a newer SSL/TLS protocol version, allowing them to decrypt such connections. For more information, refer to the knowledge base article linked to in the References section. This could result in weak SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to man-in-the-middle attacks. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash. (CVE-2016-0705) An integer overflow flaw, leading to a NULL pointer dereference or a heap-based memory corruption, was found in the way some BIGNUM functions of OpenSSL were implemented. Applications that use these functions with large untrusted input could crash or, potentially, execute arbitrary code. (CVE-2016-0797) Red Hat would like to thank the OpenSSL project for reporting these issues. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1301846 - CVE-2015-3197 OpenSSL: SSLv2 doesn't block disabled ciphers 1310593 - CVE-2016-0800 SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN) 1310596 - CVE-2016-0705 OpenSSL: Double-free in DSA code 1310599 - CVE-2016-0702 OpenSSL: Side channel attack on modular exponentiation 1311880 - CVE-2016-0797 OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: openssl-1.0.1e-42.el6_7.4.src.rpm i386: openssl-1.0.1e-42.el6_7.4.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.i686.rpm x86_64: openssl-1.0.1e-42.el6_7.4.i686.rpm openssl-1.0.1e-42.el6_7.4.x86_64.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: openssl-debuginfo-1.0.1e-42.el6_7.4.i686.rpm openssl-devel-1.0.1e-42.el6_7.4.i686.rpm openssl-perl-1.0.1e-42.el6_7.4.i686.rpm openssl-static-1.0.1e-42.el6_7.4.i686.rpm x86_64: openssl-debuginfo-1.0.1e-42.el6_7.4.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.x86_64.rpm openssl-devel-1.0.1e-42.el6_7.4.i686.rpm openssl-devel-1.0.1e-42.el6_7.4.x86_64.rpm openssl-perl-1.0.1e-42.el6_7.4.x86_64.rpm openssl-static-1.0.1e-42.el6_7.4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: openssl-1.0.1e-42.el6_7.4.src.rpm x86_64: openssl-1.0.1e-42.el6_7.4.i686.rpm openssl-1.0.1e-42.el6_7.4.x86_64.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: openssl-debuginfo-1.0.1e-42.el6_7.4.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.x86_64.rpm openssl-devel-1.0.1e-42.el6_7.4.i686.rpm openssl-devel-1.0.1e-42.el6_7.4.x86_64.rpm openssl-perl-1.0.1e-42.el6_7.4.x86_64.rpm openssl-static-1.0.1e-42.el6_7.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: openssl-1.0.1e-42.el6_7.4.src.rpm i386: openssl-1.0.1e-42.el6_7.4.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.i686.rpm openssl-devel-1.0.1e-42.el6_7.4.i686.rpm ppc64: openssl-1.0.1e-42.el6_7.4.ppc.rpm openssl-1.0.1e-42.el6_7.4.ppc64.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.ppc.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.ppc64.rpm openssl-devel-1.0.1e-42.el6_7.4.ppc.rpm openssl-devel-1.0.1e-42.el6_7.4.ppc64.rpm s390x: openssl-1.0.1e-42.el6_7.4.s390.rpm openssl-1.0.1e-42.el6_7.4.s390x.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.s390.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.s390x.rpm openssl-devel-1.0.1e-42.el6_7.4.s390.rpm openssl-devel-1.0.1e-42.el6_7.4.s390x.rpm x86_64: openssl-1.0.1e-42.el6_7.4.i686.rpm openssl-1.0.1e-42.el6_7.4.x86_64.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.x86_64.rpm openssl-devel-1.0.1e-42.el6_7.4.i686.rpm openssl-devel-1.0.1e-42.el6_7.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: openssl-debuginfo-1.0.1e-42.el6_7.4.i686.rpm openssl-perl-1.0.1e-42.el6_7.4.i686.rpm openssl-static-1.0.1e-42.el6_7.4.i686.rpm ppc64: openssl-debuginfo-1.0.1e-42.el6_7.4.ppc64.rpm openssl-perl-1.0.1e-42.el6_7.4.ppc64.rpm openssl-static-1.0.1e-42.el6_7.4.ppc64.rpm s390x: openssl-debuginfo-1.0.1e-42.el6_7.4.s390x.rpm openssl-perl-1.0.1e-42.el6_7.4.s390x.rpm openssl-static-1.0.1e-42.el6_7.4.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-42.el6_7.4.x86_64.rpm openssl-perl-1.0.1e-42.el6_7.4.x86_64.rpm openssl-static-1.0.1e-42.el6_7.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: openssl-1.0.1e-42.el6_7.4.src.rpm i386: openssl-1.0.1e-42.el6_7.4.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.i686.rpm openssl-devel-1.0.1e-42.el6_7.4.i686.rpm x86_64: openssl-1.0.1e-42.el6_7.4.i686.rpm openssl-1.0.1e-42.el6_7.4.x86_64.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.i686.rpm openssl-debuginfo-1.0.1e-42.el6_7.4.x86_64.rpm openssl-devel-1.0.1e-42.el6_7.4.i686.rpm openssl-devel-1.0.1e-42.el6_7.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: openssl-debuginfo-1.0.1e-42.el6_7.4.i686.rpm openssl-perl-1.0.1e-42.el6_7.4.i686.rpm openssl-static-1.0.1e-42.el6_7.4.i686.rpm x86_64: openssl-debuginfo-1.0.1e-42.el6_7.4.x86_64.rpm openssl-perl-1.0.1e-42.el6_7.4.x86_64.rpm openssl-static-1.0.1e-42.el6_7.4.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: openssl-1.0.1e-51.el7_2.4.src.rpm x86_64: openssl-1.0.1e-51.el7_2.4.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.4.i686.rpm openssl-libs-1.0.1e-51.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-51.el7_2.4.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.4.i686.rpm openssl-devel-1.0.1e-51.el7_2.4.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.4.x86_64.rpm openssl-static-1.0.1e-51.el7_2.4.i686.rpm openssl-static-1.0.1e-51.el7_2.4.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: openssl-1.0.1e-51.el7_2.4.src.rpm x86_64: openssl-1.0.1e-51.el7_2.4.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.4.i686.rpm openssl-libs-1.0.1e-51.el7_2.4.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-51.el7_2.4.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.4.i686.rpm openssl-devel-1.0.1e-51.el7_2.4.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.4.x86_64.rpm openssl-static-1.0.1e-51.el7_2.4.i686.rpm openssl-static-1.0.1e-51.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openssl-1.0.1e-51.el7_2.4.src.rpm ppc64: openssl-1.0.1e-51.el7_2.4.ppc64.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.ppc64.rpm openssl-devel-1.0.1e-51.el7_2.4.ppc.rpm openssl-devel-1.0.1e-51.el7_2.4.ppc64.rpm openssl-libs-1.0.1e-51.el7_2.4.ppc.rpm openssl-libs-1.0.1e-51.el7_2.4.ppc64.rpm ppc64le: openssl-1.0.1e-51.el7_2.4.ppc64le.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.ppc64le.rpm openssl-devel-1.0.1e-51.el7_2.4.ppc64le.rpm openssl-libs-1.0.1e-51.el7_2.4.ppc64le.rpm s390x: openssl-1.0.1e-51.el7_2.4.s390x.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.s390x.rpm openssl-devel-1.0.1e-51.el7_2.4.s390.rpm openssl-devel-1.0.1e-51.el7_2.4.s390x.rpm openssl-libs-1.0.1e-51.el7_2.4.s390.rpm openssl-libs-1.0.1e-51.el7_2.4.s390x.rpm x86_64: openssl-1.0.1e-51.el7_2.4.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.4.i686.rpm openssl-devel-1.0.1e-51.el7_2.4.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.4.i686.rpm openssl-libs-1.0.1e-51.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: openssl-debuginfo-1.0.1e-51.el7_2.4.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.ppc64.rpm openssl-perl-1.0.1e-51.el7_2.4.ppc64.rpm openssl-static-1.0.1e-51.el7_2.4.ppc.rpm openssl-static-1.0.1e-51.el7_2.4.ppc64.rpm ppc64le: openssl-debuginfo-1.0.1e-51.el7_2.4.ppc64le.rpm openssl-perl-1.0.1e-51.el7_2.4.ppc64le.rpm openssl-static-1.0.1e-51.el7_2.4.ppc64le.rpm s390x: openssl-debuginfo-1.0.1e-51.el7_2.4.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.s390x.rpm openssl-perl-1.0.1e-51.el7_2.4.s390x.rpm openssl-static-1.0.1e-51.el7_2.4.s390.rpm openssl-static-1.0.1e-51.el7_2.4.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-51.el7_2.4.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.4.x86_64.rpm openssl-static-1.0.1e-51.el7_2.4.i686.rpm openssl-static-1.0.1e-51.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: openssl-1.0.1e-51.el7_2.4.src.rpm x86_64: openssl-1.0.1e-51.el7_2.4.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.4.i686.rpm openssl-devel-1.0.1e-51.el7_2.4.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.4.i686.rpm openssl-libs-1.0.1e-51.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-51.el7_2.4.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.4.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.4.x86_64.rpm openssl-static-1.0.1e-51.el7_2.4.i686.rpm openssl-static-1.0.1e-51.el7_2.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3197 https://access.redhat.com/security/cve/CVE-2016-0702 https://access.redhat.com/security/cve/CVE-2016-0705 https://access.redhat.com/security/cve/CVE-2016-0797 https://access.redhat.com/security/cve/CVE-2016-0800 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/2176731 https://drownattack.com/ http://cachebleed.info/ https://openssl.org/news/secadv/20160128.txt https://openssl.org/news/secadv/20160301.txt 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFW1cCGXlSAg2UNWIIRAorHAKChVpnVB6Gpd8xZP0iwtVrS2A0ZUACgsKbz L7tzxRcDJUDUTN4/LCedKTE= =loec -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . It was discovered that the SSLv2 servers using OpenSSL accepted SSLv2 connection handshakes that indicated non-zero clear key length for non-export cipher suites. An attacker could use a SSLv2 server using OpenSSL as a Bleichenbacher oracle. A denial of service flaw was found in the way OpenSSL handled SSLv2 handshake messages

Trust: 3.69

sources: NVD: CVE-2015-3197 // CERT/CC: VU#257823 // CERT/CC: VU#583776 // BID: 82237 // BID: 74491 // VULMON: CVE-2015-3197 // PACKETSTORM: 169660 // PACKETSTORM: 169661 // PACKETSTORM: 136151 // PACKETSTORM: 141101 // PACKETSTORM: 136032 // PACKETSTORM: 135515 // PACKETSTORM: 136029 // PACKETSTORM: 136132

AFFECTED PRODUCTS

vendor:opensslmodel: - scope: - version: -

Trust: 1.6

vendor:oraclemodel:oss support toolsscope:eqversion:8.11.16.3.8

Trust: 1.6

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.16

Trust: 1.6

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.53

Trust: 1.3

vendor:oraclemodel:exalogic infrastructurescope:eqversion:2.0

Trust: 1.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.54

Trust: 1.3

vendor:oraclemodel:exalogic infrastructurescope:eqversion:1.0

Trust: 1.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.55

Trust: 1.3

vendor:oraclemodel:tuxedoscope:eqversion:12.1.1.0

Trust: 1.3

vendor:ciscomodel:unified computing system central software 1.2scope: - version: -

Trust: 1.2

vendor:opensslmodel:opensslscope:eqversion:1.0.1g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1j

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1q

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1n

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1o

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1p

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1i

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1m

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1k

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1l

Trust: 1.0

vendor:ecsystems nlmodel: - scope: - version: -

Trust: 0.8

vendor:extremenetworksmodel:wireless apscope:neversion:396510.11.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:eqversion:382510.1.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:386510.1.4

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:380110.1.4

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:eqversion:396510.1.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:eqversion:380510.1.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:382510.11.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:eqversion:386510.1.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:eqversion:371510.1.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:eqversion:380110.1.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:371510.1.4

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:380110.11.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:393510.11.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:382510.1.4

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:eqversion:393510.1.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:380510.1.4

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:396510.1.4

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:380510.11.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:371510.11.1

Trust: 0.6

vendor:extremenetworksmodel:extremexosscope:eqversion:0

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:386510.11.1

Trust: 0.6

vendor:extremenetworksmodel:wireless apscope:neversion:393510.1.4

Trust: 0.6

vendor:oraclemodel:communications network charging and controlscope:eqversion:5.0.0.2.0

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.3

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.2

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:8.3.0.0

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.2

Trust: 0.3

vendor:ciscomodel:registered envelope servicescope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:10.2-release-p8scope: - version: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1.0.3

Trust: 0.3

vendor:ciscomodel:proactive network operations centerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.9

Trust: 0.3

vendor:redhatmodel:enterprise virtualizationscope:eqversion:3

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1escope: - version: -

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.0.0.10

Trust: 0.3

vendor:ibmmodel:business process manager standardscope:eqversion:8.5.5

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:15.1

Trust: 0.3

vendor:ibmmodel:cognos insight fp ifscope:neversion:10.216

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1ascope: - version: -

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.6

Trust: 0.3

vendor:ciscomodel:computer telephony integration object serverscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.131

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:3.1

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:8.4.0.0

Trust: 0.3

vendor:freebsdmodel:10.1-release-p26scope: - version: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.2.0.2

Trust: 0.3

vendor:ciscomodel:unified contact center enterprisescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.11

Trust: 0.3

vendor:ibmmodel:cognos insight fpscope:neversion:10.2.26

Trust: 0.3

vendor:freebsdmodel:10.1-release-p5scope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:10.0

Trust: 0.3

vendor:ibmmodel:watson explorer foundational componentsscope:eqversion:9.0.0.6

Trust: 0.3

vendor:ibmmodel:real-time compression appliancescope:eqversion:4.1.2

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fixscope:eqversion:4.2.0.3

Trust: 0.3

vendor:ibmmodel:business process manager expressscope:eqversion:8.5.6

Trust: 0.3

vendor:ciscomodel:prime license managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1.0.2

Trust: 0.3

vendor:freebsdmodel:9.3-release-p22scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-release-p28scope: - version: -

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.2

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.4.0

Trust: 0.3

vendor:ciscomodel:ons series multiservice provisioning platformsscope:eqversion:154540

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1.0.1

Trust: 0.3

vendor:ibmmodel:image construction and composition toolscope:eqversion:2.3.1.0

Trust: 0.3

vendor:ciscomodel:asa next-generation firewall servicesscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:9.3-release-p10scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p1scope: - version: -

Trust: 0.3

vendor:susemodel:opensuse evergreenscope:eqversion:11.4

Trust: 0.3

vendor:ibmmodel:infosphere master data management standard/advanced editionscope:eqversion:11.5

Trust: 0.3

vendor:ibmmodel:mq light client module for node.jsscope:eqversion:1.0.2014091001

Trust: 0.3

vendor:ibmmodel:powerkvm buildscope:eqversion:2.1.157

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment buildscope:neversion:5.1.1051.07

Trust: 0.3

vendor:ibmmodel:security identity manager virtual appliancescope:eqversion:7.0.0.3

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:70000

Trust: 0.3

vendor:ciscomodel:unified series ip phonesscope:eqversion:78000

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1gscope: - version: -

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:8.3

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.3.0.4

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.3.0.1

Trust: 0.3

vendor:freebsdmodel:10.1-release-p17scope: - version: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fixscope:neversion:4.1.0.5

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1iscope: - version: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1.0.4.2

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:security identity manager virtual appliancescope:eqversion:7.0.0.2

Trust: 0.3

vendor:ciscomodel:unified attendant console advancedscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:10.2-release-p9scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-release-p27scope: - version: -

Trust: 0.3

vendor:ciscomodel:telepresence tx seriesscope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:eqversion:10000

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:mq light client module for node.jsscope:eqversion:1.0.2014090800

Trust: 0.3

vendor:freebsdmodel:10.2-release-p6scope: - version: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interix fixscope:eqversion:4.2.0.3

Trust: 0.3

vendor:ciscomodel:unified attendant console premium editionscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:real-time compression appliancescope:neversion:4.1.2.17

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.7

Trust: 0.3

vendor:ciscomodel:mediasensescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:prime optical for spsscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:neversion:2.2.1

Trust: 0.3

vendor:ibmmodel:cognos tm1 interim fixscope:neversion:10.1.1.2

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:9.5

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.3

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:7.3.0.0

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.2

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.1

Trust: 0.3

vendor:ibmmodel:business process manager expressscope:eqversion:8.5.5

Trust: 0.3

vendor:ibmmodel:cognos insightscope:eqversion:10.2.1

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0.1

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for imagesscope:eqversion:7.1.1.19

Trust: 0.3

vendor:ciscomodel:anyres livescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.3

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:10.1

Trust: 0.3

vendor:ciscomodel:unified attendant console business editionscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:9.3-release-p36scope:neversion: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fixscope:eqversion:4.1.0.5

Trust: 0.3

vendor:ibmmodel:powerkvm sp3scope:neversion:2.1.1

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.14

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.1.4

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:2.1

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.3

Trust: 0.3

vendor:ciscomodel:mds series multilayer switchesscope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:videoscape control suite foundationscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.0.0.11

Trust: 0.3

vendor:ibmmodel:cognos insightscope:eqversion:10.2

Trust: 0.3

vendor:ibmmodel:proventia network enterprise scannerscope:eqversion:2.3

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1

Trust: 0.3

vendor:ciscomodel:prime collaboration deploymentscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fix1scope:eqversion:4.3.0.6

Trust: 0.3

vendor:freebsdmodel:9.3-release-p35scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.2-release-p10scope: - version: -

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.19

Trust: 0.3

vendor:ibmmodel:rational developer for iscope:eqversion:9.5.0.1

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:unified computing system b-series serversscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational developer for iscope:eqversion:9.1.1

Trust: 0.3

vendor:ibmmodel:infosphere master data management provider hubscope:eqversion:10.0

Trust: 0.3

vendor:ibmmodel:watson explorer foundational componentsscope:eqversion:10.0.0.2

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:9.7

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:neversion:1.1.0.20

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty mediascope:eqversion:3200

Trust: 0.3

vendor:freebsdmodel:9.3-release-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-stablescope:neversion: -

Trust: 0.3

vendor:freebsdmodel:10.1-release-p1scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational application developer for websphere softwarescope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1.0.4

Trust: 0.3

vendor:freebsdmodel:10.1-release-p9scope: - version: -

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1cscope: - version: -

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fixpacscope:eqversion:3.1

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1fscope: - version: -

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.0.0.13

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.15

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2ascope: - version: -

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:eqversion:13000

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for imagesscope:eqversion:7.1.1.0

Trust: 0.3

vendor:ibmmodel:netezza diagnostics toolsscope:neversion:4.3.1.2

Trust: 0.3

vendor:ibmmodel:powerkvm buildscope:eqversion:3.12

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.3.0.2

Trust: 0.3

vendor:ibmmodel:initiate master data servicescope:eqversion:10.0

Trust: 0.3

vendor:freebsdmodel:9.3-release-p3scope: - version: -

Trust: 0.3

vendor:ciscomodel:telepresence system seriesscope:eqversion:30000

Trust: 0.3

vendor:ibmmodel:business process manager standardscope:eqversion:8.5.7

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.1

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.3.0.3

Trust: 0.3

vendor:ibmmodel:cognos tm1 fix packscope:neversion:10.2.26

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:neversion:1.2.0.10

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:7.1.1.19

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:1.0.2

Trust: 0.3

vendor:ibmmodel:cognos tm1scope:eqversion:10.1.0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2dscope: - version: -

Trust: 0.3

vendor:ciscomodel:intrusion prevention system solutionsscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3.2

Trust: 0.3

vendor:ibmmodel:rational developer for aix and linuxscope:eqversion:9.1.1

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fixscope:eqversion:4.3.0.4

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for images buildscope:neversion:7.1.1.20280.6

Trust: 0.3

vendor:freebsdmodel:9.3-release-p25scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:unified attendant console department editionscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:8.4

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.1

Trust: 0.3

vendor:ibmmodel:cognos tm1scope:eqversion:10.2.2

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:60000

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:15.2

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.1.0.10

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.1

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.2

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:cloupia unified infrastructure controllerscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:enterprise session border controller ecz7.3m2p2scope: - version: -

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.20

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.0.0.12

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1nscope: - version: -

Trust: 0.3

vendor:ibmmodel:infosphere master data management standard/advanced editionscope:eqversion:11.0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1oscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:10.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.0

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:7.9.0.0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2escope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1qscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:9.3

Trust: 0.3

vendor:oraclemodel:communications network charging and controlscope:eqversion:5.0.2.0.0

Trust: 0.3

vendor:ibmmodel:infosphere data explorerscope:eqversion:8.2

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.2.0.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:agent desktopscope: - version: -

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.9

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:neversion:7.6.404

Trust: 0.3

vendor:freebsdmodel:9.3-release-p21scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p24scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex messenger servicescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.6

Trust: 0.3

vendor:freebsdmodel:10.1-release-p19scope: - version: -

Trust: 0.3

vendor:ibmmodel:cisco directors and switches with nx-osscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.4

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fixpacscope:eqversion:3.2

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.5

Trust: 0.3

vendor:freebsdmodel:10.1-release-p29scope:neversion: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p13scope: - version: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:nx-os nexusscope:eqversion:90000

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.0.0.9

Trust: 0.3

vendor:ibmmodel:powerkvm buildscope:eqversion:2.1.165.6

Trust: 0.3

vendor:ciscomodel:mobility services enginescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:89450

Trust: 0.3

vendor:ibmmodel:initiate master data service provider hubscope:eqversion:9.5

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.10

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fix packscope:eqversion:3.11

Trust: 0.3

vendor:ibmmodel:netezza diagnostics toolsscope:eqversion:4.3.1.1

Trust: 0.3

vendor:ibmmodel:infosphere master data management standard/advanced editionscope:eqversion:11.3

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.1

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:16.1

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.8

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.13

Trust: 0.3

vendor:freebsdmodel:10.2-release-p11scope: - version: -

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.6

Trust: 0.3

vendor:ibmmodel:business process manager expressscope:eqversion:8.5.7

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5

Trust: 0.3

vendor:ibmmodel:mq light client module for node.js 1.0.2014091000-redscope: - version: -

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:8.2.0.0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.18

Trust: 0.3

vendor:freebsdmodel:9.3-release-p33scope: - version: -

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.8

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:jabber for windowsscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:10.2

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fix packscope:eqversion:3.21

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.2.0.3

Trust: 0.3

vendor:oraclemodel:ethernet switch 40g 10gscope:eqversion:642.0

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:eqversion:11000

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:7

Trust: 0.3

vendor:freebsdmodel:10.1-release-p25scope: - version: -

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.1

Trust: 0.3

vendor:oraclemodel:ethernet switch 40g 10gscope:eqversion:722.0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.2.0.6

Trust: 0.3

vendor:ibmmodel:rational developer for iscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.9

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.7

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.0

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:5.1.0.2

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.0.0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.4

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.3.0.6

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.13

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.4

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1mscope: - version: -

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.1

Trust: 0.3

vendor:ciscomodel:expressway seriesscope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2gscope:neversion: -

Trust: 0.3

vendor:ibmmodel:cisco directors and switches with nx-osscope:eqversion:7.0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2fscope:neversion: -

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.5

Trust: 0.3

vendor:freebsdmodel:10.1-release-p6scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 0.3

vendor:ibmmodel:security identity manager virtual appliancescope:eqversion:7.0.1.0

Trust: 0.3

vendor:ibmmodel:initiate master data service provider hubscope:eqversion:9.7

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3000

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.2.2

Trust: 0.3

vendor:ibmmodel:smartcloud entryscope:eqversion:3.2

Trust: 0.3

vendor:susemodel:linux enterprise server sp4 ltssscope:eqversion:10

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:3x000

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.5

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:1.0.1

Trust: 0.3

vendor:ciscomodel:nx-os nexusscope:eqversion:50000

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1jscope: - version: -

Trust: 0.3

vendor:oraclemodel:solaris sruscope:neversion:11.36.5

Trust: 0.3

vendor:oraclemodel:oss support tools oracle explorerscope:eqversion:10

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:unified attendant console standardscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational developer for iscope:eqversion:9.5.0.2

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1dscope: - version: -

Trust: 0.3

vendor:ibmmodel:security identity governance and intelligencescope:eqversion:5.2.1

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty mediascope:eqversion:3100

Trust: 0.3

vendor:freebsdmodel:9.3-release-p31scope: - version: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fix1scope:neversion:4.3.0.6

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fixpacscope:neversion:3.2

Trust: 0.3

vendor:ciscomodel:prime performance managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational developer for aix and linuxscope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:0

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment buildscope:neversion:7.1.1.20280.6

Trust: 0.3

vendor:oraclemodel:sun network 10ge switch 72pscope:eqversion:1.2

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.12

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.4

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1rscope:neversion: -

Trust: 0.3

vendor:ibmmodel:cisco directors and switches with nx-osscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:8.1.0.0

Trust: 0.3

vendor:ciscomodel:telepresence serverscope:eqversion:87107010

Trust: 0.3

vendor:ibmmodel:powerkvm buildscope:eqversion:3.13

Trust: 0.3

vendor:ibmmodel:tivoli netcool reporterscope:eqversion:2.2

Trust: 0.3

vendor:ibmmodel:rational developer for iscope:eqversion:9.5

Trust: 0.3

vendor:ibmmodel:rational developer for iscope:eqversion:9.1.1.1

Trust: 0.3

vendor:ciscomodel:telepresence server on virtual machinescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:cognos tm1scope:eqversion:10.2

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1.0.5

Trust: 0.3

vendor:freebsdmodel:10.2-release-p12scope:neversion: -

Trust: 0.3

vendor:ibmmodel:rational application developer for websphere softwarescope:eqversion:9.5

Trust: 0.3

vendor:oraclemodel:switch es1-24scope:eqversion:1.3

Trust: 0.3

vendor:ibmmodel:infosphere data explorerscope:eqversion:8.2-4

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:5.1.3

Trust: 0.3

vendor:ibmmodel:powerkvm buildscope:eqversion:2.1.165.4

Trust: 0.3

vendor:oraclemodel:communications network charging and controlscope:eqversion:5.0.1.0.0

Trust: 0.3

vendor:freebsdmodel:10.2-stablescope:neversion: -

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.14

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3

Trust: 0.3

vendor:freebsdmodel:9.3-release-p5scope: - version: -

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.4

Trust: 0.3

vendor:ciscomodel:unified intelligent contact management enterprisescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security identity manager virtual appliancescope:eqversion:7.0.0.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1kscope: - version: -

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2.3

Trust: 0.3

vendor:ibmmodel:rational developer for aix and linuxscope:eqversion:9.1.1.2

Trust: 0.3

vendor:ciscomodel:telepresencescope:eqversion:13100

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.2

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1bscope: - version: -

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:neversion:2.1.2.2

Trust: 0.3

vendor:ibmmodel:watson explorer foundational componentsscope:eqversion:10.0.0.0

Trust: 0.3

vendor:ibmmodel:powerkvm buildscope:eqversion:2.1.165.1

Trust: 0.3

vendor:ciscomodel:telepresence conductorscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:image construction and composition toolscope:eqversion:2.3.2.0

Trust: 0.3

vendor:ciscomodel:series ip phonesscope:eqversion:88000

Trust: 0.3

vendor:ibmmodel:smartcloud entry appliance fixpacscope:neversion:3.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1sscope:neversion: -

Trust: 0.3

vendor:ibmmodel:iscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:pureapplication system ifscope:neversion:2.0.0.18

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:sun blade ethernet switched nem 24p 10gescope:eqversion:60001.2

Trust: 0.3

vendor:ibmmodel:infosphere master data management standard/advanced editionscope:eqversion:11.4

Trust: 0.3

vendor:ibmmodel:cognos tm1 interim fixscope:neversion:10.2.0.2

Trust: 0.3

vendor:freebsdmodel:10.1-release-p23scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-release-p16scope: - version: -

Trust: 0.3

vendor:ibmmodel:business process manager standardscope:eqversion:8.5.6

Trust: 0.3

vendor:ibmmodel:security identity manager virtual appliancescope:eqversion:7.0.0.0

Trust: 0.3

vendor:ciscomodel:unified communications manager session management editionscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:communications network charging and controlscope:eqversion:5.0.0.1.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p6scope: - version: -

Trust: 0.3

vendor:ibmmodel:powerkvm buildscope:eqversion:2.1.165.5

Trust: 0.3

vendor:ibmmodel:iscope:eqversion:7.2

Trust: 0.3

vendor:freebsdmodel:9.3-release-p9scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2cscope: - version: -

Trust: 0.3

vendor:ibmmodel:mq light client module for node.jsscope:eqversion:1.0.2014090801

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.12

Trust: 0.3

vendor:ibmmodel:rational developer for aix and linuxscope:eqversion:9.1.1.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:powerkvm sp1scope:neversion:3.1

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:eqversion:500-320

Trust: 0.3

vendor:ciscomodel:unified attendant console enterprise editionscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:cognos insightscope:eqversion:10.2.2

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:7.1.1

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.0

Trust: 0.3

vendor:ibmmodel:watson explorer foundational componentsscope:eqversion:9.0.0.0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2bscope: - version: -

Trust: 0.3

vendor:ibmmodel:powerkvm buildscope:neversion:2.1.165.7

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.2.1

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.0.0.8

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.3.0

Trust: 0.3

vendor:freebsdmodel:9.3-release-p34scope: - version: -

Trust: 0.3

vendor:ciscomodel:emergency responderscope: - version: -

Trust: 0.3

vendor:ibmmodel:flex system chassis management module 2petscope: - version: -

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.2

Trust: 0.3

vendor:ciscomodel:telepresence systemscope:eqversion:500-370

Trust: 0.3

vendor:oraclemodel:jd edwards enterpriseone toolsscope:eqversion:9.2.0.5

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fixscope:neversion:4.2.0.3

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:30000

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.3.2

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1lscope: - version: -

Trust: 0.3

vendor:ciscomodel:im and presence servicescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:neversion:5.0.16

Trust: 0.3

vendor:freebsdmodel:9.3-release-p29scope: - version: -

Trust: 0.3

vendor:ibmmodel:cognos insight fp ifscope:neversion:10.2.126

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.2

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for images system editionscope:eqversion:x7.1.1.0

Trust: 0.3

vendor:ciscomodel:unity connectionscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:communications network charging and controlscope:eqversion:4.4.1.5.0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.0.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1hscope: - version: -

Trust: 0.3

vendor:ibmmodel:powerkvm buildscope:eqversion:2.1.158

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.2.0.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1pscope: - version: -

Trust: 0.3

vendor:ciscomodel:unified computing system central softwarescope:eqversion:1.2

Trust: 0.3

vendor:ciscomodel:unified computing system central softwarescope:eqversion:1.1

Trust: 0.3

vendor:ciscomodel:unified computing system central softwarescope:eqversion:1.0

Trust: 0.3

sources: CERT/CC: VU#257823 // CERT/CC: VU#583776 // BID: 82237 // BID: 74491 // CNNVD: CNNVD-201602-026 // NVD: CVE-2015-3197

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3197
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-0800
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201602-026
value: MEDIUM

Trust: 0.6

VULMON: CVE-2015-3197
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-3197
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2016-0800
severity: HIGH
baseScore: 7.1
vectorString: NONE
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2015-3197
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: CERT/CC: VU#583776 // VULMON: CVE-2015-3197 // CNNVD: CNNVD-201602-026 // NVD: CVE-2015-3197

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.0

problemtype:CWE-200

Trust: 1.0

sources: NVD: CVE-2015-3197

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 135515 // CNNVD: CNNVD-201602-026

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201602-026

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#583776

PATCH

title:OpenSSL Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=60033

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2016/01/29/openssl_patch_quashes_rare_https_nasty_shores_up_crypto_chops/

Trust: 0.2

title:Red Hat: CVE-2015-3197url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-3197

Trust: 0.1

title:Cisco: Multiple Vulnerabilities in OpenSSL (January 2016) Affecting Cisco Productsurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20160129-openssl

Trust: 0.1

title:Amazon Linux AMI: ALAS-2016-682url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2016-682

Trust: 0.1

title:Symantec Security Advisories: SA111 : OpenSSL Vulnerabilities 28-Jan-2016url:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=83d562565218abbdbef42ef8962d127b

Trust: 0.1

title:Amazon Linux AMI: ALAS-2016-661url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2016-661

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=eb439566c9130adc92d21bc093204cf8

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=6c15273f6bf4a785175f27073b98a1ce

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - January 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=8ad80411af3e936eb2998df70506cc71

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - April 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=122319027ae43d6d626710f1b1bb1d43

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=3a04485ebb79f7fbc2472bf9af5ce489

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2015-3197

Trust: 0.1

title:changelogurl:https://github.com/halon/changelog

Trust: 0.1

title: - url:https://github.com/imhunterand/hackerone-publicy-disclosed

Trust: 0.1

title:satellite-host-cveurl:https://github.com/RedHatSatellite/satellite-host-cve

Trust: 0.1

sources: VULMON: CVE-2015-3197 // CNNVD: CNNVD-201602-026

EXTERNAL IDS

db:NVDid:CVE-2015-3197

Trust: 3.1

db:CERT/CCid:VU#257823

Trust: 2.8

db:BIDid:82237

Trust: 2.0

db:SIEMENSid:SSA-412672

Trust: 1.7

db:BIDid:91787

Trust: 1.7

db:SECTRACKid:1034849

Trust: 1.7

db:JUNIPERid:JSA10759

Trust: 1.7

db:CERT/CCid:VU#583776

Trust: 1.1

db:AUSCERTid:ESB-2022.0696

Trust: 0.6

db:CNNVDid:CNNVD-201602-026

Trust: 0.6

db:MCAFEEid:SB10203

Trust: 0.3

db:BIDid:74491

Trust: 0.3

db:ICS CERTid:ICSA-22-349-21

Trust: 0.1

db:VULMONid:CVE-2015-3197

Trust: 0.1

db:PACKETSTORMid:169660

Trust: 0.1

db:PACKETSTORMid:169661

Trust: 0.1

db:PACKETSTORMid:136151

Trust: 0.1

db:PACKETSTORMid:141101

Trust: 0.1

db:PACKETSTORMid:136032

Trust: 0.1

db:PACKETSTORMid:135515

Trust: 0.1

db:PACKETSTORMid:136029

Trust: 0.1

db:PACKETSTORMid:136132

Trust: 0.1

sources: CERT/CC: VU#257823 // CERT/CC: VU#583776 // VULMON: CVE-2015-3197 // BID: 82237 // BID: 74491 // PACKETSTORM: 169660 // PACKETSTORM: 169661 // PACKETSTORM: 136151 // PACKETSTORM: 141101 // PACKETSTORM: 136032 // PACKETSTORM: 135515 // PACKETSTORM: 136029 // PACKETSTORM: 136132 // CNNVD: CNNVD-201602-026 // NVD: CVE-2015-3197

REFERENCES

url:https://www.kb.cert.org/vuls/id/257823

Trust: 2.1

url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 2.0

url:http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Trust: 2.0

url:http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

Trust: 2.0

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 2.0

url:http://www.openssl.org/news/secadv/20160128.txt

Trust: 1.8

url:https://security.gentoo.org/glsa/201601-05

Trust: 1.8

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Trust: 1.7

url:http://www.securityfocus.com/bid/91787

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html

Trust: 1.7

url:http://www.securityfocus.com/bid/82237

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

Trust: 1.7

url:https://security.freebsd.org/advisories/freebsd-sa-16:11.openssl.asc

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

Trust: 1.7

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03724en_us

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05390893

Trust: 1.7

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10759

Trust: 1.7

url:http://www.securitytracker.com/id/1034849

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2016-january/176373.html

Trust: 1.7

url:https://mta.openssl.org/pipermail/openssl-announce/2016-january/000061.html

Trust: 1.4

url:https://www.openssl.org/news/vulnerabilities.html#y2016

Trust: 1.1

url:https://git.openssl.org/?p=openssl.git%3ba=commit%3bh=d81a1600588b726c2bdccda7efad3cc7a87d6245

Trust: 1.1

url:https://www.openssl.org/news/secadv/20160301.txt

Trust: 0.9

url:https://tools.ietf.org/html/rfc6176

Trust: 0.9

url:http://intothesymmetry.blogspot.com/2016/01/openssl-key-recovery-attack-on-dh-small.html

Trust: 0.8

url:http://tools.ietf.org/html/rfc5114

Trust: 0.8

url:http://webstore.ansi.org/recorddetail.aspx?sku=ansi+x9.42-2003+%28r2013%29

Trust: 0.8

url:http://drownattack.com

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2015-3197

Trust: 0.8

url:https://gtacknowledge.extremenetworks.com/articles/vulnerability_notice/vn-2016-002-openssl/?q=cve-2015-3197&l=en_us&fs=search&pn=1

Trust: 0.6

url:https://git.openssl.org/?p=openssl.git;a=commit;h=d81a1600588b726c2bdccda7efad3cc7a87d6245

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0696

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2015-3197

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2016-0800

Trust: 0.5

url:http://rhn.redhat.com/errata/rhsa-2016-0379.html

Trust: 0.4

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2016-0800

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://openssl.org/news/secadv/20160128.txt

Trust: 0.4

url:http://openssl.org/

Trust: 0.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160129-openssl

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html

Trust: 0.3

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10203

Trust: 0.3

url:http://aix.software.ibm.com/aix/efixes/security/openssl_advisory17.asc

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1023433

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1023836

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1023987

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099307

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1021143

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1021265

Trust: 0.3

url:https://www.freebsd.org/security/advisories/freebsd-sa-16:11.openssl.asc

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2016-0303.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1024066

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005820

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1009610

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21976345

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21976356

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21977014

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21977018

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21977144

Trust: 0.3

url:https://www-01.ibm.com/support/docview.wss?uid=swg21978361

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21978438

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21978941

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21979086

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21979209

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21980207

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21980965

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21980969

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21981438

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21982099

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21982336

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21982697

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21984601

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21985213

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21985698

Trust: 0.3

url:https://www-01.ibm.com/support/docview.wss?uid=swg21987174

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21987175

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/583776

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21979476

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=38591

Trust: 0.3

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150506-ucsc

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-0704

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-0703

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-0293

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-0705

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-0797

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-0702

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-0701

Trust: 0.3

url:https://access.redhat.com/articles/2176731

Trust: 0.3

url:https://openssl.org/news/secadv/20160301.txt

Trust: 0.3

url:https://drownattack.com/

Trust: 0.3

url:https://www.openssl.org/policies/secpolicy.html

Trust: 0.2

url:https://www.openssl.org/policies/releasestrat.html),

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-0702

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-0705

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-0797

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-0704

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-0703

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-0293

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/310.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2015-3197

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/halon/changelog

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21

Trust: 0.1

url:http://cachebleed.info.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0798

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0799

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4000

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05390893

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2016-0304.html

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3197

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-0701

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2016-0301.html

Trust: 0.1

url:http://cachebleed.info/

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2016-0372.html

Trust: 0.1

sources: CERT/CC: VU#257823 // CERT/CC: VU#583776 // VULMON: CVE-2015-3197 // BID: 82237 // BID: 74491 // PACKETSTORM: 169660 // PACKETSTORM: 169661 // PACKETSTORM: 136151 // PACKETSTORM: 141101 // PACKETSTORM: 136032 // PACKETSTORM: 135515 // PACKETSTORM: 136029 // PACKETSTORM: 136132 // CNNVD: CNNVD-201602-026 // NVD: CVE-2015-3197

CREDITS

Nimrod Aviram and Sebastian Schinzel

Trust: 0.9

sources: BID: 82237 // CNNVD: CNNVD-201602-026

SOURCES

db:CERT/CCid:VU#257823
db:CERT/CCid:VU#583776
db:VULMONid:CVE-2015-3197
db:BIDid:82237
db:BIDid:74491
db:PACKETSTORMid:169660
db:PACKETSTORMid:169661
db:PACKETSTORMid:136151
db:PACKETSTORMid:141101
db:PACKETSTORMid:136032
db:PACKETSTORMid:135515
db:PACKETSTORMid:136029
db:PACKETSTORMid:136132
db:CNNVDid:CNNVD-201602-026
db:NVDid:CVE-2015-3197

LAST UPDATE DATE

2024-12-21T21:39:40.116000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#257823date:2016-01-29T00:00:00
db:CERT/CCid:VU#583776date:2016-03-14T00:00:00
db:VULMONid:CVE-2015-3197date:2023-11-07T00:00:00
db:BIDid:82237date:2017-12-19T22:01:00
db:BIDid:74491date:2016-07-21T02:00:00
db:CNNVDid:CNNVD-201602-026date:2022-12-14T00:00:00
db:NVDid:CVE-2015-3197date:2024-11-21T02:28:53.220

SOURCES RELEASE DATE

db:CERT/CCid:VU#257823date:2016-01-28T00:00:00
db:CERT/CCid:VU#583776date:2016-03-01T00:00:00
db:VULMONid:CVE-2015-3197date:2016-02-15T00:00:00
db:BIDid:82237date:2016-01-28T00:00:00
db:BIDid:74491date:2015-05-06T00:00:00
db:PACKETSTORMid:169660date:2016-03-01T12:12:12
db:PACKETSTORMid:169661date:2016-01-28T12:12:12
db:PACKETSTORMid:136151date:2016-03-10T14:57:03
db:PACKETSTORMid:141101date:2017-02-15T14:19:58
db:PACKETSTORMid:136032date:2016-03-02T15:44:44
db:PACKETSTORMid:135515date:2016-01-29T23:23:00
db:PACKETSTORMid:136029date:2016-03-02T14:04:44
db:PACKETSTORMid:136132date:2016-03-09T15:25:36
db:CNNVDid:CNNVD-201602-026date:2016-01-28T00:00:00
db:NVDid:CVE-2015-3197date:2016-02-15T02:59:01.980