cve-2014-3512
Vulnerability from cvelistv5
Published
2014-08-13 23:00
Modified
2024-08-06 10:43
Severity ?
Summary
Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.
References
secalert@redhat.comftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
secalert@redhat.comhttp://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142660345230545&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142660345230545&w=2
secalert@redhat.comhttp://secunia.com/advisories/59700
secalert@redhat.comhttp://secunia.com/advisories/59710
secalert@redhat.comhttp://secunia.com/advisories/59756
secalert@redhat.comhttp://secunia.com/advisories/60022
secalert@redhat.comhttp://secunia.com/advisories/60221
secalert@redhat.comhttp://secunia.com/advisories/60493
secalert@redhat.comhttp://secunia.com/advisories/60803
secalert@redhat.comhttp://secunia.com/advisories/60810
secalert@redhat.comhttp://secunia.com/advisories/60917
secalert@redhat.comhttp://secunia.com/advisories/60921
secalert@redhat.comhttp://secunia.com/advisories/61017
secalert@redhat.comhttp://secunia.com/advisories/61100
secalert@redhat.comhttp://secunia.com/advisories/61171
secalert@redhat.comhttp://secunia.com/advisories/61184
secalert@redhat.comhttp://secunia.com/advisories/61775
secalert@redhat.comhttp://secunia.com/advisories/61959
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201412-39.xml
secalert@redhat.comhttp://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21682293
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21683389
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21686997
secalert@redhat.comhttp://www.debian.org/security/2014/dsa-2998
secalert@redhat.comhttp://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
secalert@redhat.comhttp://www.securityfocus.com/bid/69083
secalert@redhat.comhttp://www.securitytracker.com/id/1030693
secalert@redhat.comhttp://www.tenable.com/security/tns-2014-06
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/95158
secalert@redhat.comhttps://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=4a23b12a031860253b58d503f296377ca076427b
secalert@redhat.comhttps://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
secalert@redhat.comhttps://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
secalert@redhat.comhttps://www.openssl.org/news/secadv_20140806.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
af854a3a-2127-422b-91ae-364da2661108http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142660345230545&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142660345230545&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59700
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59710
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59756
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60022
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60221
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60493
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60803
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60810
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60917
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60921
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61017
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61100
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61171
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61184
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61775
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61959
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201412-39.xml
af854a3a-2127-422b-91ae-364da2661108http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21682293
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21683389
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21686997
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2998
af854a3a-2127-422b-91ae-364da2661108http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/69083
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1030693
af854a3a-2127-422b-91ae-364da2661108http://www.tenable.com/security/tns-2014-06
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/95158
af854a3a-2127-422b-91ae-364da2661108https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=4a23b12a031860253b58d503f296377ca076427b
af854a3a-2127-422b-91ae-364da2661108https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
af854a3a-2127-422b-91ae-364da2661108https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
af854a3a-2127-422b-91ae-364da2661108https://www.openssl.org/news/secadv_20140806.txtVendor Advisory
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T10:43:06.360Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "openSUSE-SU-2014:1052",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html",
               },
               {
                  name: "60221",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60221",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293",
               },
               {
                  name: "61184",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61184",
               },
               {
                  name: "SSRT101846",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
               },
               {
                  name: "60022",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60022",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.openssl.org/news/secadv_20140806.txt",
               },
               {
                  name: "61017",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61017",
               },
               {
                  name: "openssl-cve20143512-dos(95158)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95158",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=4a23b12a031860253b58d503f296377ca076427b",
               },
               {
                  name: "GLSA-201412-39",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201412-39.xml",
               },
               {
                  name: "HPSBHF03293",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
               },
               {
                  name: "60803",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60803",
               },
               {
                  name: "59700",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59700",
               },
               {
                  name: "1030693",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1030693",
               },
               {
                  name: "60917",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60917",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.tenable.com/security/tns-2014-06",
               },
               {
                  name: "NetBSD-SA2014-008",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_NETBSD",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc",
               },
               {
                  name: "60493",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60493",
               },
               {
                  name: "59710",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59710",
               },
               {
                  name: "60921",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60921",
               },
               {
                  name: "60810",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60810",
               },
               {
                  name: "69083",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/69083",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240",
               },
               {
                  name: "61100",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61100",
               },
               {
                  name: "FreeBSD-SA-14:18",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FREEBSD",
                     "x_transferred",
                  ],
                  url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc",
               },
               {
                  name: "61775",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61775",
               },
               {
                  name: "DSA-2998",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2014/dsa-2998",
               },
               {
                  name: "61959",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61959",
               },
               {
                  name: "59756",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59756",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
               },
               {
                  name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html",
               },
               {
                  name: "61171",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61171",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-08-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-28T12:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "openSUSE-SU-2014:1052",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html",
            },
            {
               name: "60221",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60221",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293",
            },
            {
               name: "61184",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61184",
            },
            {
               name: "SSRT101846",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
            },
            {
               name: "60022",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60022",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.openssl.org/news/secadv_20140806.txt",
            },
            {
               name: "61017",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61017",
            },
            {
               name: "openssl-cve20143512-dos(95158)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95158",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=4a23b12a031860253b58d503f296377ca076427b",
            },
            {
               name: "GLSA-201412-39",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201412-39.xml",
            },
            {
               name: "HPSBHF03293",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
            },
            {
               name: "60803",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60803",
            },
            {
               name: "59700",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59700",
            },
            {
               name: "1030693",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1030693",
            },
            {
               name: "60917",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60917",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.tenable.com/security/tns-2014-06",
            },
            {
               name: "NetBSD-SA2014-008",
               tags: [
                  "vendor-advisory",
                  "x_refsource_NETBSD",
               ],
               url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc",
            },
            {
               name: "60493",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60493",
            },
            {
               name: "59710",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59710",
            },
            {
               name: "60921",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60921",
            },
            {
               name: "60810",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60810",
            },
            {
               name: "69083",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/69083",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240",
            },
            {
               name: "61100",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61100",
            },
            {
               name: "FreeBSD-SA-14:18",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FREEBSD",
               ],
               url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc",
            },
            {
               name: "61775",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61775",
            },
            {
               name: "DSA-2998",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2014/dsa-2998",
            },
            {
               name: "61959",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61959",
            },
            {
               name: "59756",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59756",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
            },
            {
               name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html",
            },
            {
               name: "61171",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61171",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2014-3512",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "openSUSE-SU-2014:1052",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html",
                  },
                  {
                     name: "60221",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60221",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293",
                  },
                  {
                     name: "61184",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61184",
                  },
                  {
                     name: "SSRT101846",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
                  },
                  {
                     name: "60022",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60022",
                  },
                  {
                     name: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html",
                     refsource: "CONFIRM",
                     url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html",
                  },
                  {
                     name: "https://www.openssl.org/news/secadv_20140806.txt",
                     refsource: "CONFIRM",
                     url: "https://www.openssl.org/news/secadv_20140806.txt",
                  },
                  {
                     name: "61017",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61017",
                  },
                  {
                     name: "openssl-cve20143512-dos(95158)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95158",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
                  },
                  {
                     name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm",
                  },
                  {
                     name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=4a23b12a031860253b58d503f296377ca076427b",
                     refsource: "CONFIRM",
                     url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=4a23b12a031860253b58d503f296377ca076427b",
                  },
                  {
                     name: "GLSA-201412-39",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-201412-39.xml",
                  },
                  {
                     name: "HPSBHF03293",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
                  },
                  {
                     name: "60803",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60803",
                  },
                  {
                     name: "59700",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59700",
                  },
                  {
                     name: "1030693",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1030693",
                  },
                  {
                     name: "60917",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60917",
                  },
                  {
                     name: "http://www.tenable.com/security/tns-2014-06",
                     refsource: "CONFIRM",
                     url: "http://www.tenable.com/security/tns-2014-06",
                  },
                  {
                     name: "NetBSD-SA2014-008",
                     refsource: "NETBSD",
                     url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc",
                  },
                  {
                     name: "60493",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60493",
                  },
                  {
                     name: "59710",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59710",
                  },
                  {
                     name: "60921",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60921",
                  },
                  {
                     name: "60810",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60810",
                  },
                  {
                     name: "69083",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/69083",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240",
                  },
                  {
                     name: "61100",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61100",
                  },
                  {
                     name: "FreeBSD-SA-14:18",
                     refsource: "FREEBSD",
                     url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc",
                  },
                  {
                     name: "61775",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61775",
                  },
                  {
                     name: "DSA-2998",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2014/dsa-2998",
                  },
                  {
                     name: "61959",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61959",
                  },
                  {
                     name: "59756",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59756",
                  },
                  {
                     name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
                     refsource: "CONFIRM",
                     url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
                  },
                  {
                     name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released",
                     refsource: "MLIST",
                     url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html",
                  },
                  {
                     name: "61171",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61171",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2014-3512",
      datePublished: "2014-08-13T23:00:00",
      dateReserved: "2014-05-14T00:00:00",
      dateUpdated: "2024-08-06T10:43:06.360Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      fkie_nvd: {
         configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FBD8C92-6138-4274-ACBA-D7D42DAEC5AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A2075BD-6102-4B0F-839A-836E9585F43B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A2FA09E-2BF7-4968-B62D-00DA57F81EA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"F02E634E-1E3D-4E44-BADA-76F92483A732\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCC2B07A-49EF-411F-8A4D-89435E22B043\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E9480D6-3B6A-4C41-B8C1-C3F945040772\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10FF0A06-DA61-4250-B083-67E55E362677\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A6BA453-C150-4159-B80B-5465EFF83F11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"638A2E69-8AB6-4FEA-852A-FEF16A500C1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56C47D3A-B99D-401D-B6B8-1194B2DB4809\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08355B10-E004-4BE6-A5AE-4D428810580B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"738BCFDC-1C49-4774-95AE-E099F707DEF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4B242C0-D27D-4644-AD19-5ACB853C9DC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DC683F2-4346-4E5E-A8D7-67B4F4D7827B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"764B7D38-BC1B-47DB-B1DF-D092BDA4BFCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6604E7BE-9F9B-444D-A63A-F65D1CFDF3BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"132B9217-B0E0-4E3E-9096-162AA28E158E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7619F9A0-9054-4217-93D1-3EA64876C5B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D82C405-17E2-4DF1-8DF5-315BD5A41595\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D1C00C0-C77E-4255-9ECA-20F2673C7366\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"21F16D65-8A46-4AC7-8970-73AB700035FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"92F393FF-7E6F-4671-BFBF-060162E12659\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1B85A09-CF8D-409D-966E-168F9959F6F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C684FB18-FDDC-4BED-A28C-C23EE6CD0094\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A74A79A7-4FAF-4C81-8622-050008B96AE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEDACCB9-8D61-49EE-9957-9E58BC7BB031\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4993DD56-F9E3-4AC8-AC3E-BF204B950DEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E884B241-F9C3-44F8-A420-DE65F5F3D660\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A383620-B4F7-44A7-85DA-A4FF2E115D80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F0C6812-F455-49CF-B29B-9AC00306DA43\"}]}]}]",
         descriptions: "[{\"lang\": \"en\", \"value\": \"Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples desbordamientos de buffer en crypto/srp/srp_lib.c en la implementaci\\u00f3n SRP en OpenSSL 1.0.1 anterior a 1.0.1i permiten a atacantes remotos causar una denegaci\\u00f3n de servicio (ca\\u00edda de aplicaci\\u00f3n) o posiblemente tener otro impacto no especificado a trav\\u00e9s de un par\\u00e1metro SRP (1) g, (2) A, o (3) B inv\\u00e1lido.\"}]",
         id: "CVE-2014-3512",
         lastModified: "2024-11-21T02:08:16.497",
         metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
         published: "2014-08-13T23:55:07.670",
         references: "[{\"url\": \"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142660345230545&w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142660345230545&w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/59700\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/59710\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/59756\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/60022\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/60221\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/60493\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/60803\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/60810\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/60917\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/60921\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/61017\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/61100\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/61171\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/61184\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/61775\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/61959\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201412-39.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21682293\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21683389\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686997\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2014/dsa-2998\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/69083\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securitytracker.com/id/1030693\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.tenable.com/security/tns-2014-06\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/95158\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=4a23b12a031860253b58d503f296377ca076427b\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.openssl.org/news/secadv_20140806.txt\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142660345230545&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142660345230545&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/59700\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/59710\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/59756\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60022\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60221\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60493\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60803\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60810\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60917\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60921\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61017\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61100\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61171\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61184\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61775\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61959\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201412-39.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21682293\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21683389\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686997\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2014/dsa-2998\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/69083\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1030693\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.tenable.com/security/tns-2014-06\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/95158\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=4a23b12a031860253b58d503f296377ca076427b\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.openssl.org/news/secadv_20140806.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
         sourceIdentifier: "secalert@redhat.com",
         vulnStatus: "Modified",
         weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]",
      },
      nvd: "{\"cve\":{\"id\":\"CVE-2014-3512\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-08-13T23:55:07.670\",\"lastModified\":\"2024-11-21T02:08:16.497\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.\"},{\"lang\":\"es\",\"value\":\"Múltiples desbordamientos de buffer en crypto/srp/srp_lib.c en la implementación SRP en OpenSSL 1.0.1 anterior a 1.0.1i permiten a atacantes remotos causar una denegación de servicio (caída de aplicación) o posiblemente tener otro impacto no especificado a través de un parámetro SRP (1) g, (2) A, o (3) B inválido.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBD8C92-6138-4274-ACBA-D7D42DAEC5AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A2075BD-6102-4B0F-839A-836E9585F43B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A2FA09E-2BF7-4968-B62D-00DA57F81EA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F02E634E-1E3D-4E44-BADA-76F92483A732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC2B07A-49EF-411F-8A4D-89435E22B043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E9480D6-3B6A-4C41-B8C1-C3F945040772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10FF0A06-DA61-4250-B083-67E55E362677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6BA453-C150-4159-B80B-5465EFF83F11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638A2E69-8AB6-4FEA-852A-FEF16A500C1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C47D3A-B99D-401D-B6B8-1194B2DB4809\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08355B10-E004-4BE6-A5AE-4D428810580B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738BCFDC-1C49-4774-95AE-E099F707DEF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4B242C0-D27D-4644-AD19-5ACB853C9DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC683F2-4346-4E5E-A8D7-67B4F4D7827B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"764B7D38-BC1B-47DB-B1DF-D092BDA4BFCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6604E7BE-9F9B-444D-A63A-F65D1CFDF3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"132B9217-B0E0-4E3E-9096-162AA28E158E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7619F9A0-9054-4217-93D1-3EA64876C5B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D82C405-17E2-4DF1-8DF5-315BD5A41595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D1C00C0-C77E-4255-9ECA-20F2673C7366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F16D65-8A46-4AC7-8970-73AB700035FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"92F393FF-7E6F-4671-BFBF-060162E12659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B85A09-CF8D-409D-966E-168F9959F6F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C684FB18-FDDC-4BED-A28C-C23EE6CD0094\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74A79A7-4FAF-4C81-8622-050008B96AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEDACCB9-8D61-49EE-9957-9E58BC7BB031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4993DD56-F9E3-4AC8-AC3E-BF204B950DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E884B241-F9C3-44F8-A420-DE65F5F3D660\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A383620-B4F7-44A7-85DA-A4FF2E115D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0C6812-F455-49CF-B29B-9AC00306DA43\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142660345230545&w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142660345230545&w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59700\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59710\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59756\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/60022\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/60221\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/60493\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/60803\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/60810\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/60917\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/60921\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61017\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61100\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61171\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61184\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61775\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61959\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201412-39.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21682293\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21683389\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686997\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2998\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/69083\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1030693\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.tenable.com/security/tns-2014-06\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/95158\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=4a23b12a031860253b58d503f296377ca076427b\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.openssl.org/news/secadv_20140806.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142660345230545&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142660345230545&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59700\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59710\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59756\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60493\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60803\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60810\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60917\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60921\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61017\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61100\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61171\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61775\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61959\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201412-39.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21682293\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21683389\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2998\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/69083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1030693\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.tenable.com/security/tns-2014-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/95158\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=4a23b12a031860253b58d503f296377ca076427b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.openssl.org/news/secadv_20140806.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.