ID

VAR-201404-0592


CVE

CVE-2014-0160


TITLE

Red Hat Security Advisory 2014-0396-01

Trust: 0.1

sources: PACKETSTORM: 126109

DESCRIPTION

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. OpenSSL is a 3rd party product that is embedded with some of HP Software products. This bulletin objective is to notify HP Software customers about products affected by the Heartbleed vulnerability. This weakness potentially allows disclosure of information protected, under normal conditions, by the SSL/TLS protocol. The impacted products appear in the list below are vulnerable due to embedding OpenSSL standard release software. References: CVE-2014-0160 (SSRT101499) SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Each bulletin will include a patch and/or mitigation guideline. Note: OpenSSL is an external product embedded in HP products. Bulletin Applicability: This bulletin applies to each OpenSSL component that is embedded within the HP products listed in the security bulletin. The bulletin does not apply to any other 3rd party application (e.g. operating system, web server, or application server) that may be required to be installed by the customer according instructions in the product install guide. To learn more about HP Software Incident Response, please visit http://www8.h p.com/us/en/software-solutions/enterprise-software-security-center/response-c enter.html . Software updates are available from HP Software Support Online at http://support.openview.hp.com/downloads.jsp HISTORY Version:1 (rev.1) - 11 April 2014 Initial release Version:2 (rev.2) - 13 April 2014 Added HP UCMDB Configuration Manager as impacted, updated HP UCMDB Browser impacted versions Version:3 (rev.3) - 17 April 2014 Added HP Software Autonomy WorkSite Server as impacted. It is also recommended to read the following security guidelines for remediation before applying the patch. HP StoreEver ESL G3 Tape Libraries with MCB rev 2 OpenSSL version 1.0.1f for the following firmware versions: 671H_GS00601 665H_GS12501 663H_GS04601 HP StoreEver ESL G3 Tape Libraries with MCB rev 1 Open SSL version 1.0.1e in 655H firmware versions: 655H_GS10201 HP StoreEver Enterprise Library LTO-6 Tape Drives: all firmware versions. If the library firmware cannot be updated, HP recommends following the Mitigation Instructions below. Mitigation Instructions The following configuration options that allow access to the Heartbeat function in the vulnerable versions of OpenSSL are not enabled by default. Verify that the following options are "disabled" using the Tape Library GUI: Product Configuration Options to Disable TLS Heartbeat Functions Secure SMI-S CVTL User Note: Disabling these features blocks the vulnerable OpenSSL function in both the ESL G3 Tape Library and the StoreEver Enterprise Library LTO-6 Tape Drives. The basic functionality of the library is not affected by these configuration changes and SSL access to the user interface is not affected by this configuration change or setting. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-14:06.openssl Security Advisory The FreeBSD Project Topic: OpenSSL multiple vulnerabilities Category: contrib Module: openssl Announced: 2014-04-08 Affects: All supported versions of FreeBSD. Corrected: 2014-04-08 18:27:39 UTC (stable/10, 10.0-STABLE) 2014-04-08 18:27:46 UTC (releng/10.0, 10.0-RELEASE-p1) 2014-04-08 23:16:19 UTC (stable/9, 9.2-STABLE) 2014-04-08 23:16:05 UTC (releng/9.2, 9.2-RELEASE-p4) 2014-04-08 23:16:05 UTC (releng/9.1, 9.1-RELEASE-p11) 2014-04-08 23:16:19 UTC (stable/8, 8.4-STABLE) 2014-04-08 23:16:05 UTC (releng/8.4, 8.4-RELEASE-p8) 2014-04-08 23:16:05 UTC (releng/8.3, 8.3-RELEASE-p15) CVE Name: CVE-2014-0076, CVE-2014-0160 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:http://security.FreeBSD.org/>. 0. Revision History v1.0 2014-04-08 Initial release. v1.1 2014-04-08 Added patch applying step in Solutions section. I. Background FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The Heartbeat Extension provides a new protocol for TLS/DTLS allowing the usage of keep-alive functionality without performing a renegotiation and a basis for path MTU (PMTU) discovery for DTLS. Elliptic Curve Digital Signature Algorithm (ECDSA) is a variant of the Digital Signature Algorithm (DSA) which uses Elliptic Curve Cryptography. OpenSSL uses the Montgomery Ladder Approach to compute scalar multiplication in a fixed amount of time, which does not leak any information through timing or power. II. Problem Description The code used to handle the Heartbeat Extension does not do sufficient boundary checks on record length, which allows reading beyond the actual payload. [CVE-2014-0160]. Affects FreeBSD 10.0 only. A flaw in the implementation of Montgomery Ladder Approach would create a side-channel that leaks sensitive timing information. [CVE-2014-0076] III. Impact An attacker who can send a specifically crafted packet to TLS server or client with an established connection can reveal up to 64k of memory of the remote system. Such memory might contain sensitive information, including key material, protected content, etc. which could be directly useful, or might be leveraged to obtain elevated privileges. [CVE-2014-0160] A local attacker might be able to snoop a signing process and might recover the signing key from it. [CVE-2014-0076] IV. Workaround No workaround is available, but systems that do not use OpenSSL to implement the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols implementation and do not use the ECDSA implementation from OpenSSL are not vulnerable. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. 2) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 8.x and FreeBSD 9.x] # fetch http://security.FreeBSD.org/patches/SA-14:06/openssl.patch # fetch http://security.FreeBSD.org/patches/SA-14:06/openssl.patch.asc # gpg --verify openssl.patch.asc [FreeBSD 10.0] # fetch http://security.FreeBSD.org/patches/SA-14:06/openssl-10.patch # fetch http://security.FreeBSD.org/patches/SA-14:06/openssl-10.patch.asc # gpg --verify openssl-10.patch.asc b) Execute the following commands as root: # cd /usr/src # patch < /path/to/patch Recompile the operating system using buildworld and installworld as described in <URL:http://www.FreeBSD.org/handbook/makeworld.html>. Restart all deamons using the library, or reboot the system. 3) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install IMPORTANT: the update procedure above does not update OpenSSL from the Ports Collection or from a package, known as security/openssl, which has to be updated separately via ports or package. Users who have installed security/openssl should update to at least version 1.0.1_10. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/8/ r264285 releng/8.3/ r264284 releng/8.4/ r264284 stable/9/ r264285 releng/9.1/ r264284 releng/9.2/ r264284 stable/10/ r264266 releng/10.0/ r264267 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: <URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> VII. References <URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076> <URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160> <URL:http://www.openssl.org/news/secadv_20140407.txt> <URL:http://eprint.iacr.org/2014/140.pdf> The latest revision of this advisory is available at <URL:http://security.FreeBSD.org/advisories/FreeBSD-SA-14:06.openssl.asc> -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (FreeBSD) iQIcBAEBCgAGBQJTRJySAAoJEO1n7NZdz2rnzPcQALd6So7vDRBaYiaGwQjc55oI QwTnNzkkgxVTGwi8lDV6h8bIW3Ga8AhMGoZCVOeKbDABBDghVYe6Na5e/wsHbPPu tXmDRhoi2aV0sVCTFfpoCNJ8l2lb+5vnmEC6Oi3PMQDbRC+Ptg15o0W/2hXw0eKO yu4BhS4dl6lX7IvlR1n4sr0rfa8vwxe5OpUUd6Bzw0SUBmV+BTzq1C70FuOZ/hnD ThaZS8Ox3fcWuPylhPbhxnWqg0oVNkBpiRYpIBadrpl9EiRRzbTfF+uFvauR9tBN 1mK8lLwd7DK6x8iCSnDd2ZlN1rNn8EPsGohT4vP+szz2E2YP1x8ugihEBdYax+Dh Z4TWkm3/wJwEf00G32E1hZ8F+UavE8AmnGVk6gxiRpnv2sdNJYRlWd9O8u251qMq uzcmBX6Jr14dQCwlqof8pYKYV7VCE/Cu4JHThOCL042CLwUmXyJVMFzm6WPQlNjC dlPbSG+PXjninPjcYBoMR+863X35Guv0pJBNG/ofEh+Jy5MveaMRQX/mA+wy29zm qg74lM07adXkJujPAuA5dYjZivpW1NPOHeIjaYjaI6KDw2q3BlkGa2C3PeYDQxn4 Iqujqpem5nyQY4BO2XC8gVtuym0jDSA98bgFXumNDkmzlUUuOFOWD8YScLopOzOu EpUXgezogk1Rd3EVsaJ+ =UBO0 -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: rhev-hypervisor6 security update Advisory ID: RHSA-2014:0396-01 Product: Red Hat Enterprise Virtualization Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0396.html Issue date: 2014-04-10 CVE Names: CVE-2014-0160 ===================================================================== 1. Summary: An updated rhev-hypervisor6 package that fixes one security issue is now available for Red Hat Enterprise Virtualization Hypervisor 3.2. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Relevant releases/architectures: RHEV Hypervisor for RHEL-6 - noarch 3. Description: The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: a subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Important: This update is an emergency security fix being provided outside the scope of the published support policy for Red Hat Enterprise Virtualization listed in the References section. In accordance with the support policy for Red Hat Enterprise Virtualization, Red Hat Enterprise Virtualization Hypervisor 3.2 will not receive future security updates. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. (CVE-2014-0160) Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Neel Mehta of Google Security as the original reporter. Users of the Red Hat Enterprise Virtualization Hypervisor are advised to upgrade to this updated package, which corrects this issue. Solution: This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 To upgrade Hypervisors in Red Hat Enterprise Virtualization environments using the disk image provided by this package, refer to: https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html 5. Bugs fixed (https://bugzilla.redhat.com/): 1084875 - CVE-2014-0160 openssl: information disclosure in handling of TLS heartbeat extension packets 1085357 - Packaging of RHEV-H for RHEV 3.2.6 ASYNC 6. Package List: RHEV Hypervisor for RHEL-6: noarch: rhev-hypervisor6-6.5-20140118.1.3.2.el6_5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0160.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/site/support/policy/updates/rhev/ 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. Please see the table below. To obtain the updated firmware, follow the below steps to obtain the firmware Update. Obtain the firmware update from www.hp.com/go/support Select "Drivers & Downloads". Enter the product name listed in the table below into the search field. Click on "Go". Click on the appropriate product. Under "Select operating system" select any Windows operating system from the list. Select the appropriate firmware update under "Firmware". Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including 1.0.1f and 1.0.2-beta1. Thanks for Neel Mehta of Google Security for discovering this bug and to Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for preparing the fix. Users unable to immediately upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS. 1.0.2 will be fixed in 1.0.2-beta2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04267749 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04267749 Version: 2 HPSBMU03024 rev.2 - HP Insight Control Server Deployment on Linux and Windows running OpenSSL with System Management Homepage and Systems Insight Manager, Remote Disclosure of Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2014-04-30 Last Updated: 2014-05-02 Potential Security Impact: Remote disclosure of information Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP System Management Homepage (SMH) running on Linux and Windows and HP Systems Insight Manager (SIM), components of HP Insight Control server deployment. This is the OpenSSL vulnerability known as "Heartbleed" which could be exploited remotely resulting in disclosure of information. Insight Control server deployment packages HP System Management Homepage (SMH) and HP Systems Insight Manager (SIM) and can deploy them through the below list of items. This bulletin will give you the information needed to update your HP Insight Control server deployment solution. Install HP Management Agents for Windows x86/x64 Install HP Management Agents for RHEL 5 x64 Install HP Management Agents for RHEL 6 x64 Install HP Management Agents for SLES 10 x64 Install HP Management Agents for SLES 11 x64 References: CVE-2014-0160 (SSRT101538) SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, v7.2.2 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-0160 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP is actively working to address this vulnerability for the impacted versions of HP Insight Control server deployment. This bulletin may be revised. It is recommended that customers take the following approaches depending on the version of HP Insight Control server deployment: To address the vulnerability in an initial installation of HP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, and v7.2.2 only follow steps 1 through Step 3 of the following procedure, before initiating an operating system deployment. To address the vulnerability in a previous installation of HP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, and v7.2.2 follow all steps in the following procedure. Delete the smhamd64-*.exe/smhx86-*.exe" from Component Copy Location listed in the following table, row 1,2,3,4. Delete the affected hpsmh-7.*.rpm" from Component Copy Location listed in the following table, row 5. In sequence, perform the steps from left to right in the following table. First, download components from Download Link; Second, rename the component as suggested in Rename to. Third, copy the component to the location suggested in Component Copy Location. Table Row Number Download Link Rename to Component Copy Location 1 http://www.hp.com/swpublishing/MTX-d1488fd987894bc4ab3fe0ef52 smhx86-cp023242.exe \\express\hpfeatures\hpagents-ws\components\Win2003 2 http://www.hp.com/swpublishing/MTX-4575754bbb614b58bf0ae1ac37 smhamd64-cp023243.exe \\express\hpfeatures\hpagents-ws\components\Win2003 3 http://www.hp.com/swpublishing/MTX-37075daeead2433cb41b59ae76 smhamd64-cp023341.exe \\express\hpfeatures\hpagents-ws\components\Win2008 4 http://www.hp.com/swpublishing/MTX-27e03b2f9cd24e77adc9dba94a smhx86-cp023340.exe \\express\hpfeatures\hpagents-ws\components\Win2008 5 http://www.hp.com/swpublishing/MTX-bfd3c0fb11184796b9428ced37 Do not rename the downloaded component for this step. \\express\hpfeatures\hpagents-sles11-x64\components \\express\hpfeatures\hpagents-sles10-x64\components \\express\hpfeatures\hpagents-rhel5-x64\components \\express\hpfeatures\hpagents-rhel6-x64\components Table 1 Initiate Install HP Management Agents for SLES 11 x64 on targets running SLES11 x64. Initiate Install HP Management Agents for SLES 10 x64 on targets running SLES10 x64. Initiate Install HP Management Agents for RHEL 6 x64 on targets running RHEL 6 x64. Initiate Install HP Management Agents for RHEL 5 x64 on targets running RHEL 5 x64. Initiate Install HP Management Agents for Windows x86/x64 on targets running Windows. Refer to the System Management Homepage security bulletin HPSBMU02998 for steps to take after SMH is updated to a version that is not impacted by Heartbleed, such as changing SMH passwords, and revoking SMH certificates if imported into HP Systems Insight Manager (two-way trust feature). If you have HP Systems Insight Manager versions v7.3 or v7.3.1 installed, refer to security bulletin HPSBMU03022 Related security bulletins: For System Management Homepage please see Security bulletin HPSBMU02998 https ://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04 239372 For Systems Insight Manager please see Security bulletin HPSBMU03022 https:// h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04263 236 HISTORY Version:1 (rev.1) - 30 April 2014 Initial release Version:2 (rev.2) - 2 May 2014 Updated Resolution Table Row 3 and 4 link and name information Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners

Trust: 2.52

sources: NVD: CVE-2014-0160 // PACKETSTORM: 126644 // PACKETSTORM: 126784 // PACKETSTORM: 126416 // PACKETSTORM: 127279 // PACKETSTORM: 126097 // PACKETSTORM: 126282 // PACKETSTORM: 126303 // PACKETSTORM: 126164 // VULMON: CVE-2014-0160 // PACKETSTORM: 126109 // PACKETSTORM: 126304 // PACKETSTORM: 126359 // PACKETSTORM: 126563 // PACKETSTORM: 126465 // PACKETSTORM: 126283 // PACKETSTORM: 126360 // PACKETSTORM: 126046 // PACKETSTORM: 126464

AFFECTED PRODUCTS

vendor:mitelmodel:mivoicescope:eqversion:1.1.3.3

Trust: 1.0

vendor:siemensmodel:simatic s7-1500tscope:eqversion:1.5

Trust: 1.0

vendor:intellianmodel:v100scope:eqversion:1.21

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:12.3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.10

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:6.5

Trust: 1.0

vendor:mitelmodel:mivoicescope:eqversion:1.2.0.11

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:siemensmodel:application processing enginescope:eqversion:2.0

Trust: 1.0

vendor:broadcommodel:symantec messaging gatewayscope:eqversion:10.6.1

Trust: 1.0

vendor:redhatmodel:virtualizationscope:eqversion:6.0

Trust: 1.0

vendor:intellianmodel:v100scope:eqversion:1.20

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:6.0

Trust: 1.0

vendor:siemensmodel:elan-8.2scope:ltversion:8.3.3

Trust: 1.0

vendor:redhatmodel:storagescope:eqversion:2.1

Trust: 1.0

vendor:broadcommodel:symantec messaging gatewayscope:eqversion:10.6.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:19

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion:7.3

Trust: 1.0

vendor:mitelmodel:mivoicescope:eqversion:1.1.2.5

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion:7.1

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.5

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.0.1g

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:13.10

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.1

Trust: 1.0

vendor:siemensmodel:cp 1543-1scope:eqversion:1.1

Trust: 1.0

vendor:splunkmodel:splunkscope:ltversion:6.0.3

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion:7.2

Trust: 1.0

vendor:mitelmodel:mivoicescope:eqversion:1.3.2.2

Trust: 1.0

vendor:intellianmodel:v100scope:eqversion:1.24

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion:7.0

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion:7.3.0.104

Trust: 1.0

vendor:filezillamodel:serverscope:ltversion:0.9.44

Trust: 1.0

vendor:riconmodel:s9922lscope:eqversion:16.10.3\(3794\)

Trust: 1.0

vendor:splunkmodel:splunkscope:gteversion:6.0.0

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion:6.0

Trust: 1.0

vendor:siemensmodel:simatic s7-1500scope:eqversion:1.5

Trust: 1.0

vendor:siemensmodel:wincc open architecturescope:eqversion:3.12

Trust: 1.0

vendor:intellianmodel:v60scope:eqversion:1.25

Trust: 1.0

vendor:intellianmodel:v60scope:eqversion:1.15

Trust: 1.0

vendor:mitelmodel:mivoicescope:eqversion:1.4.0.102

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:gluster storagescope:eqversion:2.1

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:20

Trust: 1.0

sources: NVD: CVE-2014-0160

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0160
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2014-0160
value: HIGH

Trust: 1.0

VULMON: CVE-2014-0160
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-0160
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

nvd@nist.gov: CVE-2014-0160
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

sources: VULMON: CVE-2014-0160 // NVD: CVE-2014-0160 // NVD: CVE-2014-0160

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.0

sources: NVD: CVE-2014-0160

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2014-0160

PATCH

title:The Registerurl:https://www.theregister.co.uk/2017/01/23/heartbleed_2017/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2014/04/24/apple_posts_updates_for_heartbleed_flaw_in_airport/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2014/04/11/hackers_hammering_heartbleed/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2014/04/09/heartbleed_vuln_analysis/

Trust: 0.2

title:Debian CVElist Bug Report Logs: CVE-2014-0160 heartbeat read overrun (heartbleed)url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=e4799ab8fe4804274ba2db4d65cd867b

Trust: 0.1

title:Debian Security Advisories: DSA-2896-1 openssl -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=264ec318be06a69e28012f62b2dc5bb7

Trust: 0.1

title:Ubuntu Security Notice: openssl vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2165-1

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2014-0160

Trust: 0.1

title:exploitsurl:https://github.com/vs4vijay/exploits

Trust: 0.1

title:VULNIXurl:https://github.com/El-Palomo/VULNIX

Trust: 0.1

title:openssl-heartbleed-fixurl:https://github.com/sammyfung/openssl-heartbleed-fix

Trust: 0.1

title:cve-2014-0160url:https://github.com/cved-sources/cve-2014-0160

Trust: 0.1

title:heartbleed_checkurl:https://github.com/ehoffmann-cp/heartbleed_check

Trust: 0.1

title:heartbleedurl:https://github.com/okrutnik420/heartbleed

Trust: 0.1

title:heartbleed-test.crxurl:https://github.com/iwaffles/heartbleed-test.crx

Trust: 0.1

title: - url:https://github.com/Maheshmaske111/te

Trust: 0.1

title:AradSocketurl:https://github.com/araditc/AradSocket

Trust: 0.1

title:sslscanurl:https://github.com/kaisenlinux/sslscan

Trust: 0.1

title:Springboard_Capstone_Projecturl:https://github.com/jonahwinninghoff/Springboard_Capstone_Project

Trust: 0.1

title: - url:https://github.com/MrE-Fog/heartbleeder

Trust: 0.1

title:buffer_overflow_exploiturl:https://github.com/olivamadrigal/buffer_overflow_exploit

Trust: 0.1

title: - url:https://github.com/ashrafulislamcs/Ubuntu-Server-Hardening

Trust: 0.1

title:insecure_projecturl:https://github.com/turtlesec-no/insecure_project

Trust: 0.1

title: - url:https://github.com/Maheshmaske111/ssl

Trust: 0.1

title: - url:https://github.com/H4R335HR/heartbleed

Trust: 0.1

title:nmap-scriptsurl:https://github.com/takeshixx/nmap-scripts

Trust: 0.1

title:knockbleedurl:https://github.com/siddolo/knockbleed

Trust: 0.1

title:heartbleed-masstesturl:https://github.com/musalbas/heartbleed-masstest

Trust: 0.1

title:HeartBleedDotNeturl:https://github.com/ShawInnes/HeartBleedDotNet

Trust: 0.1

title:heartbleed_test_openvpnurl:https://github.com/weisslj/heartbleed_test_openvpn

Trust: 0.1

title:paraffinurl:https://github.com/vmeurisse/paraffin

Trust: 0.1

title:sslscanurl:https://github.com/rbsec/sslscan

Trust: 0.1

title:Heartbleed_Dockerfile_with_Nginxurl:https://github.com/froyo75/Heartbleed_Dockerfile_with_Nginx

Trust: 0.1

title:heartbleed-bugurl:https://github.com/cldme/heartbleed-bug

Trust: 0.1

title: - url:https://github.com/H4CK3RT3CH/awesome-web-hacking

Trust: 0.1

title:Web-Hackingurl:https://github.com/adm0i/Web-Hacking

Trust: 0.1

title:cybersecurity-ethical-hackingurl:https://github.com/paulveillard/cybersecurity-ethical-hacking

Trust: 0.1

title:Lastest-Web-Hacking-Tools-vol-Iurl:https://github.com/SARATOGAMarine/Lastest-Web-Hacking-Tools-vol-I

Trust: 0.1

title:HTBValentineWriteupurl:https://github.com/zimmel15/HTBValentineWriteup

Trust: 0.1

title:heartbleed-pocurl:https://github.com/sensepost/heartbleed-poc

Trust: 0.1

title:CVE-2014-0160url:https://github.com/0x90/CVE-2014-0160

Trust: 0.1

title:Certified-Ethical-Hacker-Exam-CEH-v10url:https://github.com/Tung0801/Certified-Ethical-Hacker-Exam-CEH-v10

Trust: 0.1

title:cs558heartbleedurl:https://github.com/gkaptch1/cs558heartbleed

Trust: 0.1

title:HeartBleedurl:https://github.com/archaic-magnon/HeartBleed

Trust: 0.1

title: - url:https://github.com/undacmic/heartbleed-proof-of-concept

Trust: 0.1

title:openvpn-jookkurl:https://github.com/Jeypi04/openvpn-jookk

Trust: 0.1

title:Heartbleedurl:https://github.com/Saiprasad16/Heartbleed

Trust: 0.1

title: - url:https://github.com/KickFootCode/LoveYouALL

Trust: 0.1

title: - url:https://github.com/imesecan/LeakReducer-artifacts

Trust: 0.1

title: - url:https://github.com/TVernet/Kali-Tools-liste-et-description

Trust: 0.1

title: - url:https://github.com/k4u5h41/Heartbleed

Trust: 0.1

title: - url:https://github.com/ronaldogdm/Heartbleed

Trust: 0.1

title: - url:https://github.com/rochacbruno/my-awesome-stars

Trust: 0.1

title: - url:https://github.com/asadhasan73/temp_comp_sec

Trust: 0.1

title: - url:https://github.com/Aakaashzz/Heartbleed

Trust: 0.1

title:tls-channelurl:https://github.com/marianobarrios/tls-channel

Trust: 0.1

title:fuzzx_cpp_demourl:https://github.com/guardstrikelab/fuzzx_cpp_demo

Trust: 0.1

title: - url:https://github.com/Ppamo/recon_net_tools

Trust: 0.1

title:heatbleedingurl:https://github.com/idkqh7/heatbleeding

Trust: 0.1

title:HeartBleed-Vulnerability-Checkerurl:https://github.com/waqasjamal/HeartBleed-Vulnerability-Checker

Trust: 0.1

title:heartbleedurl:https://github.com/iSCInc/heartbleed

Trust: 0.1

title:heartbleed-dtlsurl:https://github.com/hreese/heartbleed-dtls

Trust: 0.1

title:heartbleedcheckerurl:https://github.com/roganartu/heartbleedchecker

Trust: 0.1

title:nmap-heartbleedurl:https://github.com/azet/nmap-heartbleed

Trust: 0.1

title:sslscanurl:https://github.com/delishen/sslscan

Trust: 0.1

title:web-hackingurl:https://github.com/hr-beast/web-hacking

Trust: 0.1

title: - url:https://github.com/Miss-Brain/Web-Application-Security

Trust: 0.1

title:web-hackingurl:https://github.com/Hemanthraju02/web-hacking

Trust: 0.1

title:awesome-web-hackingurl:https://github.com/QWERTSKIHACK/awesome-web-hacking

Trust: 0.1

title: - url:https://github.com/himera25/web-hacking-list

Trust: 0.1

title: - url:https://github.com/dorota-fiit/bp-Heartbleed-defense-game

Trust: 0.1

title: - url:https://github.com/Maheshmaske111/sslscan

Trust: 0.1

title:Heart-bleedurl:https://github.com/anonymouse327311/Heart-bleed

Trust: 0.1

title:goScanurl:https://github.com/stackviolator/goScan

Trust: 0.1

title:sec-tool-listurl:https://github.com/alphaSeclab/sec-tool-list

Trust: 0.1

title: - url:https://github.com/utensil/awesome-stars-test

Trust: 0.1

title:insecure-cplusplus-dojourl:https://github.com/patricia-gallardo/insecure-cplusplus-dojo

Trust: 0.1

title: - url:https://github.com/jubalh/awesome-package-maintainer

Trust: 0.1

title: - url:https://github.com/Elnatty/tryhackme_labs

Trust: 0.1

title: - url:https://github.com/hzuiw33/OpenSSL

Trust: 0.1

title:makeItBleedurl:https://github.com/mcampa/makeItBleed

Trust: 0.1

title:CVE-2014-0160-Chrome-Pluginurl:https://github.com/Xyl2k/CVE-2014-0160-Chrome-Plugin

Trust: 0.1

title:heartbleedfixer.comurl:https://github.com/reenhanced/heartbleedfixer.com

Trust: 0.1

title:CVE-2014-0160-Scannerurl:https://github.com/obayesshelton/CVE-2014-0160-Scanner

Trust: 0.1

title:openmagicurl:https://github.com/isgroup-srl/openmagic

Trust: 0.1

title:heartbleederurl:https://github.com/titanous/heartbleeder

Trust: 0.1

title:cardiac-arresturl:https://github.com/ah8r/cardiac-arrest

Trust: 0.1

title:heartbleed_openvpn_pocurl:https://github.com/tam7t/heartbleed_openvpn_poc

Trust: 0.1

title:docker-wheezy-with-heartbleedurl:https://github.com/simonswine/docker-wheezy-with-heartbleed

Trust: 0.1

title:docker-testsslurl:https://github.com/mbentley/docker-testssl

Trust: 0.1

title:heartbleedscannerurl:https://github.com/hybridus/heartbleedscanner

Trust: 0.1

title:HeartLeakurl:https://github.com/OffensivePython/HeartLeak

Trust: 0.1

title:HBLurl:https://github.com/ssc-oscar/HBL

Trust: 0.1

title:awesome-starsurl:https://github.com/utensil/awesome-stars

Trust: 0.1

title:SecurityTesting_web-hackingurl:https://github.com/mostakimur/SecurityTesting_web-hacking

Trust: 0.1

title:awesome-web-hackingurl:https://github.com/winterwolf32/awesome-web-hacking

Trust: 0.1

title:awesome-web-hacking-1url:https://github.com/winterwolf32/awesome-web-hacking-1

Trust: 0.1

title: - url:https://github.com/Mehedi-Babu/ethical_hacking_cyber

Trust: 0.1

title: - url:https://github.com/drakyanerlanggarizkiwardhana/awesome-web-hacking

Trust: 0.1

title:awesome-web-hackingurl:https://github.com/thanshurc/awesome-web-hacking

Trust: 0.1

title:hackurl:https://github.com/nvnpsplt/hack

Trust: 0.1

title:awesome-web-hackingurl:https://github.com/noname1007/awesome-web-hacking

Trust: 0.1

title: - url:https://github.com/ImranTheThirdEye/awesome-web-hacking

Trust: 0.1

title:web-hackingurl:https://github.com/Ondrik8/web-hacking

Trust: 0.1

title:CheckSSL-ciphersuiteurl:https://github.com/kal1gh0st/CheckSSL-ciphersuite

Trust: 0.1

title: - url:https://github.com/undacmic/HeartBleed-Demo

Trust: 0.1

title: - url:https://github.com/MrE-Fog/ssl-heartbleed.nse

Trust: 0.1

title:welivesecurityurl:https://www.welivesecurity.com/2015/08/03/worlds-biggest-bug-bounty-payouts/

Trust: 0.1

title:Threatposturl:https://threatpost.com/oracle-gives-heartbleed-update-patches-14-products/105576/

Trust: 0.1

sources: VULMON: CVE-2014-0160

EXTERNAL IDS

db:NVDid:CVE-2014-0160

Trust: 2.8

db:SECUNIAid:57721

Trust: 1.1

db:SECUNIAid:59243

Trust: 1.1

db:SECUNIAid:57836

Trust: 1.1

db:SECUNIAid:57968

Trust: 1.1

db:SECUNIAid:59347

Trust: 1.1

db:SECUNIAid:57966

Trust: 1.1

db:SECUNIAid:57483

Trust: 1.1

db:SECUNIAid:57347

Trust: 1.1

db:SECUNIAid:59139

Trust: 1.1

db:SECTRACKid:1030079

Trust: 1.1

db:SECTRACKid:1030074

Trust: 1.1

db:SECTRACKid:1030081

Trust: 1.1

db:SECTRACKid:1030080

Trust: 1.1

db:SECTRACKid:1030026

Trust: 1.1

db:SECTRACKid:1030077

Trust: 1.1

db:SECTRACKid:1030082

Trust: 1.1

db:SECTRACKid:1030078

Trust: 1.1

db:BIDid:66690

Trust: 1.1

db:EXPLOIT-DBid:32745

Trust: 1.1

db:EXPLOIT-DBid:32764

Trust: 1.1

db:USCERTid:TA14-098A

Trust: 1.1

db:SIEMENSid:SSA-635659

Trust: 1.1

db:CERT/CCid:VU#720951

Trust: 1.1

db:ICS CERTid:ICSA-14-135-02

Trust: 0.1

db:VULMONid:CVE-2014-0160

Trust: 0.1

db:PACKETSTORMid:126109

Trust: 0.1

db:PACKETSTORMid:126046

Trust: 0.1

db:PACKETSTORMid:126360

Trust: 0.1

db:PACKETSTORMid:126283

Trust: 0.1

db:PACKETSTORMid:126465

Trust: 0.1

db:PACKETSTORMid:126563

Trust: 0.1

db:PACKETSTORMid:126359

Trust: 0.1

db:PACKETSTORMid:126304

Trust: 0.1

db:PACKETSTORMid:126464

Trust: 0.1

db:PACKETSTORMid:126644

Trust: 0.1

db:PACKETSTORMid:126164

Trust: 0.1

db:PACKETSTORMid:126303

Trust: 0.1

db:PACKETSTORMid:126282

Trust: 0.1

db:PACKETSTORMid:126097

Trust: 0.1

db:PACKETSTORMid:127279

Trust: 0.1

db:PACKETSTORMid:126416

Trust: 0.1

db:PACKETSTORMid:126784

Trust: 0.1

sources: VULMON: CVE-2014-0160 // PACKETSTORM: 126109 // PACKETSTORM: 126046 // PACKETSTORM: 126360 // PACKETSTORM: 126283 // PACKETSTORM: 126465 // PACKETSTORM: 126563 // PACKETSTORM: 126359 // PACKETSTORM: 126304 // PACKETSTORM: 126464 // PACKETSTORM: 126644 // PACKETSTORM: 126164 // PACKETSTORM: 126303 // PACKETSTORM: 126282 // PACKETSTORM: 126097 // PACKETSTORM: 127279 // PACKETSTORM: 126416 // PACKETSTORM: 126784 // NVD: CVE-2014-0160

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2014-0160

Trust: 1.7

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 1.4

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 1.4

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 1.4

url:http://rhn.redhat.com/errata/rhsa-2014-0396.html

Trust: 1.2

url:https://bugzilla.redhat.com/show_bug.cgi?id=1084875

Trust: 1.1

url:http://www.openssl.org/news/secadv_20140407.txt

Trust: 1.1

url:http://heartbleed.com/

Trust: 1.1

url:http://www.securitytracker.com/id/1030078

Trust: 1.1

url:http://seclists.org/fulldisclosure/2014/apr/109

Trust: 1.1

url:http://seclists.org/fulldisclosure/2014/apr/190

Trust: 1.1

url:https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-april/000184.html

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2014-0376.html

Trust: 1.1

url:http://www.securitytracker.com/id/1030082

Trust: 1.1

url:http://secunia.com/advisories/57347

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139722163017074&w=2

Trust: 1.1

url:http://www.securitytracker.com/id/1030077

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21670161

Trust: 1.1

url:http://www.debian.org/security/2014/dsa-2896

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2014-0377.html

Trust: 1.1

url:http://www.securitytracker.com/id/1030080

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2014-april/131221.html

Trust: 1.1

url:http://www.securitytracker.com/id/1030074

Trust: 1.1

url:http://seclists.org/fulldisclosure/2014/apr/90

Trust: 1.1

url:http://www.securitytracker.com/id/1030081

Trust: 1.1

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140409-heartbleed

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2014-0378.html

Trust: 1.1

url:http://seclists.org/fulldisclosure/2014/apr/91

Trust: 1.1

url:http://secunia.com/advisories/57483

Trust: 1.1

url:http://www.splunk.com/view/sp-caaamb3

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2014-april/131291.html

Trust: 1.1

url:http://www.securitytracker.com/id/1030079

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html

Trust: 1.1

url:http://secunia.com/advisories/57721

Trust: 1.1

url:http://www.blackberry.com/btsc/kb35882

Trust: 1.1

url:http://www.securitytracker.com/id/1030026

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html

Trust: 1.1

url:http://www.securityfocus.com/bid/66690

Trust: 1.1

url:http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/

Trust: 1.1

url:http://www.us-cert.gov/ncas/alerts/ta14-098a

Trust: 1.1

url:http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/

Trust: 1.1

url:http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/

Trust: 1.1

url:https://blog.torproject.org/blog/openssl-bug-cve-2014-0160

Trust: 1.1

url:http://secunia.com/advisories/57966

Trust: 1.1

url:http://www.f-secure.com/en/web/labs_global/fsc-2014-1

Trust: 1.1

url:http://seclists.org/fulldisclosure/2014/apr/173

Trust: 1.1

url:http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/

Trust: 1.1

url:http://secunia.com/advisories/57968

Trust: 1.1

url:https://code.google.com/p/mod-spdy/issues/detail?id=85

Trust: 1.1

url:http://www.exploit-db.com/exploits/32745

Trust: 1.1

url:http://www.kb.cert.org/vuls/id/720951

Trust: 1.1

url:https://www.cert.fi/en/reports/2014/vulnerability788210.html

Trust: 1.1

url:http://www.exploit-db.com/exploits/32764

Trust: 1.1

url:http://secunia.com/advisories/57836

Trust: 1.1

url:https://gist.github.com/chapmajs/10473815

Trust: 1.1

url:http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/

Trust: 1.1

url:http://cogentdatahub.com/releasenotes.html

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139905458328378&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139869891830365&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139889113431619&w=2

Trust: 1.1

url:http://public.support.unisys.com/common/public/vulnerability/nvd_detail_rpt.aspx?id=1

Trust: 1.1

url:http://www.kerio.com/support/kerio-control/release-history

Trust: 1.1

url:http://public.support.unisys.com/common/public/vulnerability/nvd_detail_rpt.aspx?id=3

Trust: 1.1

url:http://advisories.mageia.org/mgasa-2014-0165.html

Trust: 1.1

url:https://h20566.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay&spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c04260637-4%257cdoclocale%253den_us%257ccalledby%253dsearch_result&javax.portlet.begcachetok=com.vignette.cachetoken&javax.portlet.endcachetok=com.vignette.cachetoken

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=isg400001843

Trust: 1.1

url:https://filezilla-project.org/versions.php?type=server

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=isg400001841

Trust: 1.1

url:https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=141287864628122&w=2

Trust: 1.1

url:http://seclists.org/fulldisclosure/2014/dec/23

Trust: 1.1

url:http://www.vmware.com/security/advisories/vmsa-2014-0012.html

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142660345230545&w=2

Trust: 1.1

url:http://www.websense.com/support/article/kbarticle/vulnerabilities-resolved-in-triton-apx-version-8-0

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:062

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139817727317190&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139757726426985&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139758572430452&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139905653828999&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139842151128341&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139905405728262&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139833395230364&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139824993005633&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139843768401936&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139905202427693&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139774054614965&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139889295732144&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139835815211508&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=140724451518351&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139808058921905&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139836085512508&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139869720529462&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139905868529690&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139765756720506&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=140015787404650&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139824923705461&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139757919027752&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139774703817488&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139905243827825&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=140075368411126&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139905295427946&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139835844111589&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139757819327350&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139817685517037&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139905351928096&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139817782017443&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=140752315422991&w=2

Trust: 1.1

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004661

Trust: 1.1

url:http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_release_notes.pdf

Trust: 1.1

url:http://www.apcmedia.com/salestools/sjhn-7rkgnm/sjhn-7rkgnm_r4_en.pdf

Trust: 1.1

url:http://secunia.com/advisories/59347

Trust: 1.1

url:http://secunia.com/advisories/59243

Trust: 1.1

url:http://secunia.com/advisories/59139

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html

Trust: 1.1

url:http://download.schneider-electric.com/files?p_doc_ref=sevd%202014-119-01

Trust: 1.1

url:https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html

Trust: 1.1

url:http://support.citrix.com/article/ctx140605

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2165-1

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html

Trust: 1.1

url:http://www.securityfocus.com/archive/1/534161/100/0/threaded

Trust: 1.1

url:https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008

Trust: 1.1

url:https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf

Trust: 1.1

url:https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd

Trust: 1.1

url:http://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=96db9023b881d7cd9f379b0c154650d6c108e9a3

Trust: 1.1

url:https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3cdev.tomcat.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3cdev.tomcat.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3cdev.tomcat.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3cdev.tomcat.apache.org%3e

Trust: 1.1

url:http://support.openview.hp.com/downloads.jsp

Trust: 0.7

url:http://www8.hp.com/us/en/software-so

Trust: 0.4

url:http://www8.h

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/p

Trust: 0.2

url:http://support.openview.hp.com/selfsolve/document/km00843314/binary/sa_alert_

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:http://seclists.org/fulldisclosure/2019/jan/42

Trust: 0.1

url:https://www.debian.org/security/./dsa-2896

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/oracle-gives-heartbleed-update-patches-14-products/105576/

Trust: 0.1

url:https://ics-cert.us-cert.gov/advisories/icsa-14-135-02

Trust: 0.1

url:https://usn.ubuntu.com/2165-1/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-0160.html

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:https://access.redhat.com/site/support/policy/updates/rhev/

Trust: 0.1

url:https://access.redhat.com/site/articles/11258

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/site/documentation/en-us/red_hat_enterprise_linux/6/html/hypervisor_deployment_guide/chap-deployment_guide-upgrading_red_hat_enterprise_virtualization_hypervisors.html

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/km00868126

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_n

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/hpsm_00556

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/km00843525

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/hpsm_00560

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/hpsm_00557

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/hpsm_00559

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/hpsm_00558

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/srva_00174

Trust: 0.1

url:https://www.hp.com/go/support

Trust: 0.1

url:http://www.hp.com/swpublishing/mtx-d1488fd987894bc4ab3fe0ef52

Trust: 0.1

url:http://www.hp.com/swpublishing/mtx-4575754bbb614b58bf0ae1ac37

Trust: 0.1

url:http://www.hp.com/swpublishing/mtx-37075daeead2433cb41b59ae76

Trust: 0.1

url:http://www.hp.com/swpublishing/mtx-27e03b2f9cd24e77adc9dba94a

Trust: 0.1

url:http://www.hp.com/swpublishing/mtx-bfd3c0fb11184796b9428ced37

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lrvug_00092

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lrlg_00051

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/pc_00299

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lranlsys_00074

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03305

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03329

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/pc_00296

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03307

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lrlg_00052

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03315

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03306

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lranlsys_00075

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03328

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03332

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lrvug_00094

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03316

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03304

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/lid/lr_03333

Trust: 0.1

url:http://h18013.www1.hp.com/products/servers/management/agents/index.html

Trust: 0.1

url:http://www.hp.com/swpublishing/mtx-4503970ccd6841dca639ddbcee

Trust: 0.1

url:http://www.hp.com/swpublishing/mtx-9ef95a0fdf044f7aa5f7a09445

Trust: 0.1

url:http://security.freebsd.org/patches/sa-14:06/openssl.patch.asc

Trust: 0.1

url:http://security.freebsd.org/patches/sa-14:06/openssl-10.patch.asc

Trust: 0.1

url:http://www.freebsd.org/handbook/makeworld.html>.

Trust: 0.1

url:http://eprint.iacr.org/2014/140.pdf>

Trust: 0.1

url:http://security.freebsd.org/>.

Trust: 0.1

url:http://security.freebsd.org/advisories/freebsd-sa-14:06.openssl.asc>

Trust: 0.1

url:http://www.openssl.org/news/secadv_20140407.txt>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0076>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160>

Trust: 0.1

url:http://security.freebsd.org/patches/sa-14:06/openssl-10.patch

Trust: 0.1

url:http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>

Trust: 0.1

url:http://security.freebsd.org/patches/sa-14:06/openssl.patch

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0076

Trust: 0.1

url:http://www.hp.com/support/eslg3

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/

Trust: 0.1

sources: VULMON: CVE-2014-0160 // PACKETSTORM: 126109 // PACKETSTORM: 126046 // PACKETSTORM: 126360 // PACKETSTORM: 126283 // PACKETSTORM: 126465 // PACKETSTORM: 126563 // PACKETSTORM: 126359 // PACKETSTORM: 126304 // PACKETSTORM: 126464 // PACKETSTORM: 126644 // PACKETSTORM: 126164 // PACKETSTORM: 126303 // PACKETSTORM: 126282 // PACKETSTORM: 126097 // PACKETSTORM: 127279 // PACKETSTORM: 126416 // PACKETSTORM: 126784 // NVD: CVE-2014-0160

CREDITS

HP

Trust: 1.4

sources: PACKETSTORM: 126360 // PACKETSTORM: 126283 // PACKETSTORM: 126465 // PACKETSTORM: 126563 // PACKETSTORM: 126359 // PACKETSTORM: 126304 // PACKETSTORM: 126464 // PACKETSTORM: 126644 // PACKETSTORM: 126164 // PACKETSTORM: 126303 // PACKETSTORM: 126282 // PACKETSTORM: 127279 // PACKETSTORM: 126416 // PACKETSTORM: 126784

SOURCES

db:VULMONid:CVE-2014-0160
db:PACKETSTORMid:126109
db:PACKETSTORMid:126046
db:PACKETSTORMid:126360
db:PACKETSTORMid:126283
db:PACKETSTORMid:126465
db:PACKETSTORMid:126563
db:PACKETSTORMid:126359
db:PACKETSTORMid:126304
db:PACKETSTORMid:126464
db:PACKETSTORMid:126644
db:PACKETSTORMid:126164
db:PACKETSTORMid:126303
db:PACKETSTORMid:126282
db:PACKETSTORMid:126097
db:PACKETSTORMid:127279
db:PACKETSTORMid:126416
db:PACKETSTORMid:126784
db:NVDid:CVE-2014-0160

LAST UPDATE DATE

2025-09-26T22:48:58.656000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2014-0160date:2023-11-07T00:00:00
db:NVDid:CVE-2014-0160date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULMONid:CVE-2014-0160date:2014-04-07T00:00:00
db:PACKETSTORMid:126109date:2014-04-10T22:54:11
db:PACKETSTORMid:126046date:2014-04-07T22:54:01
db:PACKETSTORMid:126360date:2014-04-28T20:35:41
db:PACKETSTORMid:126283date:2014-04-23T21:24:44
db:PACKETSTORMid:126465date:2014-05-03T17:55:00
db:PACKETSTORMid:126563date:2014-05-09T17:31:25
db:PACKETSTORMid:126359date:2014-04-28T20:34:46
db:PACKETSTORMid:126304date:2014-04-24T22:21:00
db:PACKETSTORMid:126464date:2014-05-03T17:02:00
db:PACKETSTORMid:126644date:2014-05-16T04:40:57
db:PACKETSTORMid:126164date:2014-04-15T23:01:44
db:PACKETSTORMid:126303date:2014-04-24T22:20:36
db:PACKETSTORMid:126282date:2014-04-23T21:24:26
db:PACKETSTORMid:126097date:2014-04-09T23:30:40
db:PACKETSTORMid:127279date:2014-06-30T23:47:20
db:PACKETSTORMid:126416date:2014-05-01T02:16:18
db:PACKETSTORMid:126784date:2014-05-23T13:13:00
db:NVDid:CVE-2014-0160date:2014-04-07T22:55:03.893