CVE-2014-5139 (GCVE-0-2014-5139)
Vulnerability from cvelistv5
Published
2014-08-13 23:00
Modified
2024-08-06 11:34
Severity ?
Summary
The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
References
cret@cert.orgftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
cret@cert.orghttp://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
cret@cert.orghttp://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
cret@cert.orghttp://marc.info/?l=bugtraq&m=142350350616251&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=142350350616251&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=142495837901899&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=142495837901899&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=142624590206005&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=142624619906067
cret@cert.orghttp://marc.info/?l=bugtraq&m=142624619906067&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=142624679706236&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=142624679706236&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=142624719706349&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=142624719706349&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=142660345230545&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=142660345230545&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=142791032306609&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=143290437727362&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=143290522027658&w=2
cret@cert.orghttp://secunia.com/advisories/59700
cret@cert.orghttp://secunia.com/advisories/59710
cret@cert.orghttp://secunia.com/advisories/59756
cret@cert.orghttp://secunia.com/advisories/60022
cret@cert.orghttp://secunia.com/advisories/60221
cret@cert.orghttp://secunia.com/advisories/60493
cret@cert.orghttp://secunia.com/advisories/60803
cret@cert.orghttp://secunia.com/advisories/60810
cret@cert.orghttp://secunia.com/advisories/60917
cret@cert.orghttp://secunia.com/advisories/60921
cret@cert.orghttp://secunia.com/advisories/61017
cret@cert.orghttp://secunia.com/advisories/61100
cret@cert.orghttp://secunia.com/advisories/61171
cret@cert.orghttp://secunia.com/advisories/61184
cret@cert.orghttp://secunia.com/advisories/61392
cret@cert.orghttp://secunia.com/advisories/61775
cret@cert.orghttp://secunia.com/advisories/61959
cret@cert.orghttp://security.gentoo.org/glsa/glsa-201412-39.xml
cret@cert.orghttp://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html
cret@cert.orghttp://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
cret@cert.orghttp://www-01.ibm.com/support/docview.wss?uid=swg21682293
cret@cert.orghttp://www-01.ibm.com/support/docview.wss?uid=swg21683389
cret@cert.orghttp://www-01.ibm.com/support/docview.wss?uid=swg21686997
cret@cert.orghttp://www.debian.org/security/2014/dsa-2998
cret@cert.orghttp://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
cret@cert.orghttp://www.securityfocus.com/bid/69077
cret@cert.orghttp://www.securitytracker.com/id/1030693
cret@cert.orghttp://www.tenable.com/security/tns-2014-06
cret@cert.orghttps://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=80bd7b41b30af6ee96f519e629463583318de3b0
cret@cert.orghttps://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=83764a989dcc87fbea337da5f8f86806fe767b7e
cret@cert.orghttps://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
cret@cert.orghttps://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
cret@cert.orghttps://www.openssl.org/news/secadv_20140806.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
af854a3a-2127-422b-91ae-364da2661108http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142350350616251&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142350350616251&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142495837901899&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142495837901899&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142624590206005&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142624619906067
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142624619906067&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142624679706236&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142624679706236&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142624719706349&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142624719706349&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142660345230545&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142660345230545&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142791032306609&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143290437727362&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143290522027658&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59700
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59710
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59756
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60022
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60221
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60493
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60803
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60810
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60917
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60921
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61017
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61100
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61171
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61184
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61392
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61775
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61959
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201412-39.xml
af854a3a-2127-422b-91ae-364da2661108http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21682293
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21683389
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21686997
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2998
af854a3a-2127-422b-91ae-364da2661108http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/69077
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1030693
af854a3a-2127-422b-91ae-364da2661108http://www.tenable.com/security/tns-2014-06
af854a3a-2127-422b-91ae-364da2661108https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=80bd7b41b30af6ee96f519e629463583318de3b0
af854a3a-2127-422b-91ae-364da2661108https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=83764a989dcc87fbea337da5f8f86806fe767b7e
af854a3a-2127-422b-91ae-364da2661108https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
af854a3a-2127-422b-91ae-364da2661108https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
af854a3a-2127-422b-91ae-364da2661108https://www.openssl.org/news/secadv_20140806.txtVendor Advisory
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T11:34:37.376Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "openSUSE-SU-2014:1052",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html",
               },
               {
                  name: "60221",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60221",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293",
               },
               {
                  name: "61184",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61184",
               },
               {
                  name: "SSRT101846",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
               },
               {
                  name: "60022",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60022",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.openssl.org/news/secadv_20140806.txt",
               },
               {
                  name: "61017",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61017",
               },
               {
                  name: "SSRT101818",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
               },
               {
                  name: "HPSBMU03304",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2",
               },
               {
                  name: "HPSBMU03259",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142624619906067&w=2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm",
               },
               {
                  name: "GLSA-201412-39",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201412-39.xml",
               },
               {
                  name: "HPSBHF03293",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
               },
               {
                  name: "69077",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/69077",
               },
               {
                  name: "HPSBMU03260",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2",
               },
               {
                  name: "60803",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60803",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=80bd7b41b30af6ee96f519e629463583318de3b0",
               },
               {
                  name: "59700",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59700",
               },
               {
                  name: "1030693",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1030693",
               },
               {
                  name: "60917",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60917",
               },
               {
                  name: "HPSBMU03216",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.tenable.com/security/tns-2014-06",
               },
               {
                  name: "NetBSD-SA2014-008",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_NETBSD",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc",
               },
               {
                  name: "60493",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60493",
               },
               {
                  name: "59710",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59710",
               },
               {
                  name: "60921",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60921",
               },
               {
                  name: "60810",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60810",
               },
               {
                  name: "HPSBMU03283",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240",
               },
               {
                  name: "61100",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61100",
               },
               {
                  name: "FreeBSD-SA-14:18",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FREEBSD",
                     "x_transferred",
                  ],
                  url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc",
               },
               {
                  name: "61775",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61775",
               },
               {
                  name: "SSRT101894",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2",
               },
               {
                  name: "DSA-2998",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2014/dsa-2998",
               },
               {
                  name: "HPSBMU03263",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2",
               },
               {
                  name: "SSRT101921",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2",
               },
               {
                  name: "61959",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61959",
               },
               {
                  name: "59756",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59756",
               },
               {
                  name: "HPSBMU03262",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2",
               },
               {
                  name: "HPSBMU03267",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2",
               },
               {
                  name: "HPSBMU03261",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
               },
               {
                  name: "61392",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61392",
               },
               {
                  name: "SSRT101916",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2",
               },
               {
                  name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html",
               },
               {
                  name: "61171",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61171",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=83764a989dcc87fbea337da5f8f86806fe767b7e",
               },
               {
                  name: "SSRT101922",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142624619906067",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-08-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-01-04T20:57:01",
            orgId: "37e5125f-f79b-445b-8fad-9564f167944b",
            shortName: "certcc",
         },
         references: [
            {
               name: "openSUSE-SU-2014:1052",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html",
            },
            {
               name: "60221",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60221",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293",
            },
            {
               name: "61184",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61184",
            },
            {
               name: "SSRT101846",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
            },
            {
               name: "60022",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60022",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.openssl.org/news/secadv_20140806.txt",
            },
            {
               name: "61017",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61017",
            },
            {
               name: "SSRT101818",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
            },
            {
               name: "HPSBMU03304",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2",
            },
            {
               name: "HPSBMU03259",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142624619906067&w=2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm",
            },
            {
               name: "GLSA-201412-39",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201412-39.xml",
            },
            {
               name: "HPSBHF03293",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
            },
            {
               name: "69077",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/69077",
            },
            {
               name: "HPSBMU03260",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2",
            },
            {
               name: "60803",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60803",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=80bd7b41b30af6ee96f519e629463583318de3b0",
            },
            {
               name: "59700",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59700",
            },
            {
               name: "1030693",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1030693",
            },
            {
               name: "60917",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60917",
            },
            {
               name: "HPSBMU03216",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.tenable.com/security/tns-2014-06",
            },
            {
               name: "NetBSD-SA2014-008",
               tags: [
                  "vendor-advisory",
                  "x_refsource_NETBSD",
               ],
               url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc",
            },
            {
               name: "60493",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60493",
            },
            {
               name: "59710",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59710",
            },
            {
               name: "60921",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60921",
            },
            {
               name: "60810",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60810",
            },
            {
               name: "HPSBMU03283",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240",
            },
            {
               name: "61100",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61100",
            },
            {
               name: "FreeBSD-SA-14:18",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FREEBSD",
               ],
               url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc",
            },
            {
               name: "61775",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61775",
            },
            {
               name: "SSRT101894",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2",
            },
            {
               name: "DSA-2998",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2014/dsa-2998",
            },
            {
               name: "HPSBMU03263",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2",
            },
            {
               name: "SSRT101921",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2",
            },
            {
               name: "61959",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61959",
            },
            {
               name: "59756",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59756",
            },
            {
               name: "HPSBMU03262",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2",
            },
            {
               name: "HPSBMU03267",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2",
            },
            {
               name: "HPSBMU03261",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
            },
            {
               name: "61392",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61392",
            },
            {
               name: "SSRT101916",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2",
            },
            {
               name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html",
            },
            {
               name: "61171",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61171",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=83764a989dcc87fbea337da5f8f86806fe767b7e",
            },
            {
               name: "SSRT101922",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142624619906067",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cert@cert.org",
               ID: "CVE-2014-5139",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "openSUSE-SU-2014:1052",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html",
                  },
                  {
                     name: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html",
                     refsource: "CONFIRM",
                     url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html",
                  },
                  {
                     name: "60221",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60221",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293",
                  },
                  {
                     name: "61184",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61184",
                  },
                  {
                     name: "SSRT101846",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
                  },
                  {
                     name: "60022",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60022",
                  },
                  {
                     name: "https://www.openssl.org/news/secadv_20140806.txt",
                     refsource: "CONFIRM",
                     url: "https://www.openssl.org/news/secadv_20140806.txt",
                  },
                  {
                     name: "61017",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61017",
                  },
                  {
                     name: "SSRT101818",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389",
                  },
                  {
                     name: "HPSBMU03304",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2",
                  },
                  {
                     name: "HPSBMU03259",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142624619906067&w=2",
                  },
                  {
                     name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm",
                  },
                  {
                     name: "GLSA-201412-39",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-201412-39.xml",
                  },
                  {
                     name: "HPSBHF03293",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
                  },
                  {
                     name: "69077",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/69077",
                  },
                  {
                     name: "HPSBMU03260",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2",
                  },
                  {
                     name: "60803",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60803",
                  },
                  {
                     name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=80bd7b41b30af6ee96f519e629463583318de3b0",
                     refsource: "CONFIRM",
                     url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=80bd7b41b30af6ee96f519e629463583318de3b0",
                  },
                  {
                     name: "59700",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59700",
                  },
                  {
                     name: "1030693",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1030693",
                  },
                  {
                     name: "60917",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60917",
                  },
                  {
                     name: "HPSBMU03216",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2",
                  },
                  {
                     name: "http://www.tenable.com/security/tns-2014-06",
                     refsource: "CONFIRM",
                     url: "http://www.tenable.com/security/tns-2014-06",
                  },
                  {
                     name: "NetBSD-SA2014-008",
                     refsource: "NETBSD",
                     url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc",
                  },
                  {
                     name: "60493",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60493",
                  },
                  {
                     name: "59710",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59710",
                  },
                  {
                     name: "60921",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60921",
                  },
                  {
                     name: "60810",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60810",
                  },
                  {
                     name: "HPSBMU03283",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240",
                  },
                  {
                     name: "61100",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61100",
                  },
                  {
                     name: "FreeBSD-SA-14:18",
                     refsource: "FREEBSD",
                     url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc",
                  },
                  {
                     name: "61775",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61775",
                  },
                  {
                     name: "SSRT101894",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2",
                  },
                  {
                     name: "DSA-2998",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2014/dsa-2998",
                  },
                  {
                     name: "HPSBMU03263",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2",
                  },
                  {
                     name: "SSRT101921",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2",
                  },
                  {
                     name: "61959",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61959",
                  },
                  {
                     name: "59756",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59756",
                  },
                  {
                     name: "HPSBMU03262",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2",
                  },
                  {
                     name: "HPSBMU03267",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2",
                  },
                  {
                     name: "HPSBMU03261",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2",
                  },
                  {
                     name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
                     refsource: "CONFIRM",
                     url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
                  },
                  {
                     name: "61392",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61392",
                  },
                  {
                     name: "SSRT101916",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2",
                  },
                  {
                     name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released",
                     refsource: "MLIST",
                     url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html",
                  },
                  {
                     name: "61171",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61171",
                  },
                  {
                     name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=83764a989dcc87fbea337da5f8f86806fe767b7e",
                     refsource: "CONFIRM",
                     url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=83764a989dcc87fbea337da5f8f86806fe767b7e",
                  },
                  {
                     name: "SSRT101922",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142624619906067",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b",
      assignerShortName: "certcc",
      cveId: "CVE-2014-5139",
      datePublished: "2014-08-13T23:00:00",
      dateReserved: "2014-07-30T00:00:00",
      dateUpdated: "2024-08-06T11:34:37.376Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      fkie_nvd: {
         configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D1C00C0-C77E-4255-9ECA-20F2673C7366\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"21F16D65-8A46-4AC7-8970-73AB700035FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"92F393FF-7E6F-4671-BFBF-060162E12659\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1B85A09-CF8D-409D-966E-168F9959F6F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C684FB18-FDDC-4BED-A28C-C23EE6CD0094\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A74A79A7-4FAF-4C81-8622-050008B96AE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEDACCB9-8D61-49EE-9957-9E58BC7BB031\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4993DD56-F9E3-4AC8-AC3E-BF204B950DEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E884B241-F9C3-44F8-A420-DE65F5F3D660\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A383620-B4F7-44A7-85DA-A4FF2E115D80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F0C6812-F455-49CF-B29B-9AC00306DA43\"}]}]}]",
         descriptions: "[{\"lang\": \"en\", \"value\": \"The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n ssl_set_client_disabled en t1_lib.c en OpenSSL 1.0.1 anterior a 1.0.1i permite a servidores SSL remotos causar una denegaci\\u00f3n de servicio (referencia a puntero nulo y ca\\u00edda de la aplicaci\\u00f3n del cliente) a trav\\u00e9s de un mensaje ServerHello que incluye un suite de cifrado SRP sin la negociaci\\u00f3n necesaria de este suite de cifrada con el cliente.\"}]",
         evaluatorComment: "<a href=\"http://cwe.mitre.org/data/definitions/476.html\" target=\"_blank\">CWE-476: NULL Pointer Dereference</a>",
         id: "CVE-2014-5139",
         lastModified: "2024-11-21T02:11:29.627",
         metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
         published: "2014-08-13T23:55:07.717",
         references: "[{\"url\": \"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142350350616251&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142350350616251&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142495837901899&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142495837901899&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624590206005&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624619906067\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624619906067&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624679706236&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624679706236&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624719706349&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624719706349&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142660345230545&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142660345230545&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142791032306609&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=143290437727362&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=143290522027658&w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/59700\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/59710\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/59756\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/60022\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/60221\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/60493\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/60803\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/60810\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/60917\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/60921\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/61017\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/61100\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/61171\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/61184\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/61392\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/61775\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/61959\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201412-39.xml\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21682293\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21683389\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686997\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.debian.org/security/2014/dsa-2998\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.securityfocus.com/bid/69077\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.securitytracker.com/id/1030693\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.tenable.com/security/tns-2014-06\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=80bd7b41b30af6ee96f519e629463583318de3b0\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=83764a989dcc87fbea337da5f8f86806fe767b7e\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://www.openssl.org/news/secadv_20140806.txt\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142350350616251&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142350350616251&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142495837901899&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142495837901899&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624590206005&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624619906067\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624619906067&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624679706236&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624679706236&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624719706349&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142624719706349&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142660345230545&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142660345230545&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142791032306609&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=143290437727362&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=143290522027658&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/59700\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/59710\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/59756\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60022\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60221\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60493\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60803\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60810\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60917\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60921\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61017\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61100\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61171\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61184\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61392\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61775\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61959\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201412-39.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21682293\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21683389\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686997\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2014/dsa-2998\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/69077\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1030693\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.tenable.com/security/tns-2014-06\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=80bd7b41b30af6ee96f519e629463583318de3b0\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=83764a989dcc87fbea337da5f8f86806fe767b7e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.openssl.org/news/secadv_20140806.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
         sourceIdentifier: "cret@cert.org",
         vulnStatus: "Modified",
         weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]",
      },
      nvd: "{\"cve\":{\"id\":\"CVE-2014-5139\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2014-08-13T23:55:07.717\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.\"},{\"lang\":\"es\",\"value\":\"La función ssl_set_client_disabled en t1_lib.c en OpenSSL 1.0.1 anterior a 1.0.1i permite a servidores SSL remotos causar una denegación de servicio (referencia a puntero nulo y caída de la aplicación del cliente) a través de un mensaje ServerHello que incluye un suite de cifrado SRP sin la negociación necesaria de este suite de cifrada con el cliente.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D1C00C0-C77E-4255-9ECA-20F2673C7366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F16D65-8A46-4AC7-8970-73AB700035FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"92F393FF-7E6F-4671-BFBF-060162E12659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B85A09-CF8D-409D-966E-168F9959F6F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C684FB18-FDDC-4BED-A28C-C23EE6CD0094\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74A79A7-4FAF-4C81-8622-050008B96AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEDACCB9-8D61-49EE-9957-9E58BC7BB031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4993DD56-F9E3-4AC8-AC3E-BF204B950DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E884B241-F9C3-44F8-A420-DE65F5F3D660\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A383620-B4F7-44A7-85DA-A4FF2E115D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0C6812-F455-49CF-B29B-9AC00306DA43\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc\",\"source\":\"cret@cert.org\"},{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142350350616251&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142350350616251&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142495837901899&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142495837901899&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624590206005&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624619906067\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624619906067&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624679706236&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624679706236&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624719706349&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624719706349&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142660345230545&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142660345230545&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142791032306609&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=143290437727362&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=143290522027658&w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/59700\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/59710\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/59756\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/60022\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/60221\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/60493\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/60803\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/60810\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/60917\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/60921\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/61017\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/61100\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/61171\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/61184\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/61392\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/61775\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/61959\",\"source\":\"cret@cert.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201412-39.xml\",\"source\":\"cret@cert.org\"},{\"url\":\"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21682293\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21683389\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686997\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2998\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securityfocus.com/bid/69077\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securitytracker.com/id/1030693\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.tenable.com/security/tns-2014-06\",\"source\":\"cret@cert.org\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=80bd7b41b30af6ee96f519e629463583318de3b0\",\"source\":\"cret@cert.org\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=83764a989dcc87fbea337da5f8f86806fe767b7e\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.openssl.org/news/secadv_20140806.txt\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142350350616251&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142350350616251&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142495837901899&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142495837901899&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624590206005&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624619906067\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624619906067&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624679706236&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624679706236&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624719706349&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142624719706349&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142660345230545&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142660345230545&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142791032306609&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=143290437727362&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=143290522027658&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59700\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59710\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59756\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60493\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60803\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60810\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60917\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60921\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61017\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61100\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61171\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61392\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61775\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61959\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201412-39.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21682293\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21683389\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2998\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/69077\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1030693\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.tenable.com/security/tns-2014-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=80bd7b41b30af6ee96f519e629463583318de3b0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=83764a989dcc87fbea337da5f8f86806fe767b7e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.openssl.org/news/secadv_20140806.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}],\"evaluatorComment\":\"<a href=\\\"http://cwe.mitre.org/data/definitions/476.html\\\" target=\\\"_blank\\\">CWE-476: NULL Pointer Dereference</a>\"}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.