Action not permitted
Modal body text goes here.
Modal Title
Modal Body
Vulnerability from csaf_suse
Published
2014-10-22 23:22
Modified
2014-10-22 23:22
Summary
Security update for openssl1
Notes
Title of the patch
Security update for openssl1
Description of the patch
This OpenSSL update fixes the following issues:
* SRTP Memory Leak (CVE-2014-3513)
* Session Ticket Memory Leak (CVE-2014-3567)
* Build option no-ssl3 is incomplete (CVE-2014-3568)
* Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)
Security Issues:
* CVE-2014-3513
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513>
* CVE-2014-3567
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567>
* CVE-2014-3566
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566>
* CVE-2014-3568
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568>
Patchnames
secsp3-libopenssl1-devel
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for openssl1", title: "Title of the patch", }, { category: "description", text: "\nThis OpenSSL update fixes the following issues:\n\n * SRTP Memory Leak (CVE-2014-3513)\n * Session Ticket Memory Leak (CVE-2014-3567)\n * Build option no-ssl3 is incomplete (CVE-2014-3568)\n * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)\n\nSecurity Issues:\n\n * CVE-2014-3513\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513>\n * CVE-2014-3567\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567>\n * CVE-2014-3566\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566>\n * CVE-2014-3568\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568>\n\n", title: "Description of the patch", }, { category: "details", text: "secsp3-libopenssl1-devel", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1185-1.json", }, { category: "self", summary: "URL for SUSE-SU-2015:1185-1", url: "https://www.suse.com/support/update/announcement/2015/suse-su-20151185-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2015:1185-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html", }, { category: "self", summary: "SUSE Bug 860332", url: "https://bugzilla.suse.com/860332", }, { category: "self", summary: "SUSE Bug 861014", url: "https://bugzilla.suse.com/861014", }, { category: "self", summary: "SUSE Bug 864912", url: "https://bugzilla.suse.com/864912", }, { category: "self", summary: "SUSE Bug 869945", url: "https://bugzilla.suse.com/869945", }, { category: "self", summary: "SUSE Bug 872299", url: "https://bugzilla.suse.com/872299", }, { category: "self", summary: "SUSE Bug 873351", url: "https://bugzilla.suse.com/873351", }, { category: "self", summary: "SUSE Bug 876282", url: "https://bugzilla.suse.com/876282", }, { category: "self", summary: "SUSE Bug 880891", url: "https://bugzilla.suse.com/880891", }, { category: "self", summary: "SUSE Bug 889812", url: "https://bugzilla.suse.com/889812", }, { category: "self", summary: "SUSE Bug 890764", url: "https://bugzilla.suse.com/890764", }, { category: "self", summary: "SUSE Bug 890767", url: "https://bugzilla.suse.com/890767", }, { category: "self", summary: "SUSE Bug 890768", url: "https://bugzilla.suse.com/890768", }, { category: "self", summary: "SUSE Bug 890769", url: "https://bugzilla.suse.com/890769", }, { category: "self", summary: "SUSE Bug 890770", url: "https://bugzilla.suse.com/890770", }, { category: "self", summary: "SUSE Bug 901223", url: "https://bugzilla.suse.com/901223", }, { category: "self", summary: "SUSE Bug 901277", url: "https://bugzilla.suse.com/901277", }, { category: "self", summary: "SUSE Bug 906878", url: "https://bugzilla.suse.com/906878", }, { category: "self", summary: "SUSE Bug 912014", url: "https://bugzilla.suse.com/912014", }, { category: "self", summary: "SUSE Bug 912015", url: "https://bugzilla.suse.com/912015", }, { category: "self", summary: "SUSE Bug 912018", url: "https://bugzilla.suse.com/912018", }, { category: "self", summary: "SUSE Bug 912292", url: "https://bugzilla.suse.com/912292", }, { category: "self", summary: "SUSE Bug 912293", url: "https://bugzilla.suse.com/912293", }, { category: "self", summary: "SUSE Bug 912294", url: "https://bugzilla.suse.com/912294", }, { category: "self", summary: "SUSE Bug 912296", url: "https://bugzilla.suse.com/912296", }, { category: "self", summary: "SUSE Bug 919648", url: "https://bugzilla.suse.com/919648", }, { category: "self", summary: "SUSE Bug 920236", url: "https://bugzilla.suse.com/920236", }, { category: "self", summary: "SUSE Bug 922488", url: "https://bugzilla.suse.com/922488", }, { category: "self", summary: "SUSE Bug 922496", url: "https://bugzilla.suse.com/922496", }, { category: "self", summary: "SUSE Bug 922499", url: "https://bugzilla.suse.com/922499", }, { category: "self", summary: "SUSE Bug 922500", url: "https://bugzilla.suse.com/922500", }, { category: "self", summary: "SUSE Bug 922501", url: "https://bugzilla.suse.com/922501", }, { category: "self", summary: "SUSE Bug 923384", url: "https://bugzilla.suse.com/923384", }, { category: "self", summary: "SUSE Bug 929678", url: "https://bugzilla.suse.com/929678", }, { category: "self", summary: "SUSE Bug 931698", url: "https://bugzilla.suse.com/931698", }, { category: "self", summary: "SUSE Bug 933911", url: "https://bugzilla.suse.com/933911", }, { category: "self", summary: "SUSE Bug 934487", url: "https://bugzilla.suse.com/934487", }, { category: "self", summary: "SUSE Bug 934489", url: "https://bugzilla.suse.com/934489", }, { category: "self", summary: "SUSE Bug 934491", url: "https://bugzilla.suse.com/934491", }, { category: "self", summary: "SUSE Bug 934493", url: "https://bugzilla.suse.com/934493", }, { category: "self", summary: "SUSE Bug 934494", url: "https://bugzilla.suse.com/934494", }, { category: "self", summary: "SUSE CVE CVE-2010-5298 page", url: "https://www.suse.com/security/cve/CVE-2010-5298/", }, { category: "self", summary: "SUSE CVE CVE-2014-0160 page", url: "https://www.suse.com/security/cve/CVE-2014-0160/", }, { category: "self", summary: "SUSE CVE CVE-2014-0195 page", url: "https://www.suse.com/security/cve/CVE-2014-0195/", }, { category: "self", summary: "SUSE CVE CVE-2014-0198 page", url: "https://www.suse.com/security/cve/CVE-2014-0198/", }, { category: "self", summary: "SUSE CVE CVE-2014-0221 page", url: "https://www.suse.com/security/cve/CVE-2014-0221/", }, { category: "self", summary: "SUSE CVE CVE-2014-0224 page", url: "https://www.suse.com/security/cve/CVE-2014-0224/", }, { category: "self", summary: "SUSE CVE CVE-2014-3470 page", url: "https://www.suse.com/security/cve/CVE-2014-3470/", }, { category: "self", summary: "SUSE CVE CVE-2014-3505 page", url: "https://www.suse.com/security/cve/CVE-2014-3505/", }, { category: "self", summary: "SUSE CVE CVE-2014-3506 page", url: "https://www.suse.com/security/cve/CVE-2014-3506/", }, { category: "self", summary: "SUSE CVE CVE-2014-3507 page", url: "https://www.suse.com/security/cve/CVE-2014-3507/", }, { category: "self", summary: "SUSE CVE CVE-2014-3508 page", url: "https://www.suse.com/security/cve/CVE-2014-3508/", }, { category: "self", summary: "SUSE CVE CVE-2014-3509 page", url: "https://www.suse.com/security/cve/CVE-2014-3509/", }, { category: "self", summary: "SUSE CVE CVE-2014-3510 page", url: "https://www.suse.com/security/cve/CVE-2014-3510/", }, { category: "self", summary: "SUSE CVE CVE-2014-3511 page", url: "https://www.suse.com/security/cve/CVE-2014-3511/", }, { category: "self", summary: "SUSE CVE CVE-2014-3512 page", url: "https://www.suse.com/security/cve/CVE-2014-3512/", }, { category: "self", summary: "SUSE CVE CVE-2014-3513 page", url: "https://www.suse.com/security/cve/CVE-2014-3513/", }, { category: "self", summary: "SUSE CVE CVE-2014-3566 page", url: "https://www.suse.com/security/cve/CVE-2014-3566/", }, { category: "self", summary: "SUSE CVE CVE-2014-3567 page", url: "https://www.suse.com/security/cve/CVE-2014-3567/", }, { category: "self", summary: "SUSE CVE CVE-2014-3568 page", url: "https://www.suse.com/security/cve/CVE-2014-3568/", }, { category: "self", summary: "SUSE CVE CVE-2014-3570 page", url: "https://www.suse.com/security/cve/CVE-2014-3570/", }, { category: "self", summary: "SUSE CVE CVE-2014-3571 page", url: "https://www.suse.com/security/cve/CVE-2014-3571/", }, { category: "self", summary: "SUSE CVE CVE-2014-3572 page", url: "https://www.suse.com/security/cve/CVE-2014-3572/", }, { category: "self", summary: "SUSE CVE CVE-2014-5139 page", url: "https://www.suse.com/security/cve/CVE-2014-5139/", }, { category: "self", summary: "SUSE CVE CVE-2014-8176 page", url: "https://www.suse.com/security/cve/CVE-2014-8176/", }, { category: "self", summary: "SUSE CVE CVE-2014-8275 page", url: "https://www.suse.com/security/cve/CVE-2014-8275/", }, { category: "self", summary: "SUSE CVE CVE-2015-0204 page", url: "https://www.suse.com/security/cve/CVE-2015-0204/", }, { category: "self", summary: "SUSE CVE CVE-2015-0205 page", url: "https://www.suse.com/security/cve/CVE-2015-0205/", }, { category: "self", summary: "SUSE CVE CVE-2015-0206 page", url: "https://www.suse.com/security/cve/CVE-2015-0206/", }, { category: "self", summary: "SUSE CVE CVE-2015-0209 page", url: "https://www.suse.com/security/cve/CVE-2015-0209/", }, { category: "self", summary: "SUSE CVE CVE-2015-0286 page", url: "https://www.suse.com/security/cve/CVE-2015-0286/", }, { category: "self", summary: "SUSE CVE CVE-2015-0287 page", url: "https://www.suse.com/security/cve/CVE-2015-0287/", }, { category: "self", summary: "SUSE CVE CVE-2015-0288 page", url: "https://www.suse.com/security/cve/CVE-2015-0288/", }, { category: "self", summary: "SUSE CVE CVE-2015-0289 page", url: "https://www.suse.com/security/cve/CVE-2015-0289/", }, { category: "self", summary: "SUSE CVE CVE-2015-0292 page", url: "https://www.suse.com/security/cve/CVE-2015-0292/", }, { category: "self", summary: "SUSE CVE CVE-2015-0293 page", url: "https://www.suse.com/security/cve/CVE-2015-0293/", }, { category: "self", summary: "SUSE CVE CVE-2015-1788 page", url: "https://www.suse.com/security/cve/CVE-2015-1788/", }, { category: "self", summary: "SUSE CVE CVE-2015-1789 page", url: "https://www.suse.com/security/cve/CVE-2015-1789/", }, { category: "self", summary: "SUSE CVE CVE-2015-1790 page", url: "https://www.suse.com/security/cve/CVE-2015-1790/", }, { category: "self", summary: "SUSE CVE CVE-2015-1791 page", url: "https://www.suse.com/security/cve/CVE-2015-1791/", }, { category: "self", summary: "SUSE CVE CVE-2015-1792 page", url: "https://www.suse.com/security/cve/CVE-2015-1792/", }, { category: "self", summary: "SUSE CVE CVE-2015-4000 page", url: "https://www.suse.com/security/cve/CVE-2015-4000/", }, ], title: "Security update for openssl1", tracking: { current_release_date: "2014-10-22T23:22:56Z", generator: { date: "2014-10-22T23:22:56Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2015:1185-1", initial_release_date: "2014-10-22T23:22:56Z", revision_history: [ { date: "2014-10-22T23:22:56Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libopenssl1-devel-1.0.1g-0.22.1.i586", product: { name: "libopenssl1-devel-1.0.1g-0.22.1.i586", product_id: "libopenssl1-devel-1.0.1g-0.22.1.i586", }, }, { category: "product_version", name: "libopenssl1_0_0-1.0.1g-0.22.1.i586", product: { name: "libopenssl1_0_0-1.0.1g-0.22.1.i586", product_id: "libopenssl1_0_0-1.0.1g-0.22.1.i586", }, }, { category: "product_version", name: "openssl1-1.0.1g-0.22.1.i586", product: { name: "openssl1-1.0.1g-0.22.1.i586", product_id: "openssl1-1.0.1g-0.22.1.i586", }, }, { category: "product_version", name: "openssl1-doc-1.0.1g-0.22.1.i586", product: { name: "openssl1-doc-1.0.1g-0.22.1.i586", product_id: "openssl1-doc-1.0.1g-0.22.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "libopenssl1-devel-1.0.1g-0.22.1.ia64", product: { name: "libopenssl1-devel-1.0.1g-0.22.1.ia64", product_id: "libopenssl1-devel-1.0.1g-0.22.1.ia64", }, }, { category: "product_version", name: "libopenssl1_0_0-1.0.1g-0.22.1.ia64", product: { name: "libopenssl1_0_0-1.0.1g-0.22.1.ia64", product_id: "libopenssl1_0_0-1.0.1g-0.22.1.ia64", }, }, { category: "product_version", name: "libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", product: { name: "libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", product_id: "libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", }, }, { category: "product_version", name: "openssl1-1.0.1g-0.22.1.ia64", product: { name: "openssl1-1.0.1g-0.22.1.ia64", product_id: "openssl1-1.0.1g-0.22.1.ia64", }, }, { category: "product_version", name: "openssl1-doc-1.0.1g-0.22.1.ia64", product: { name: "openssl1-doc-1.0.1g-0.22.1.ia64", product_id: "openssl1-doc-1.0.1g-0.22.1.ia64", }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "libopenssl1-devel-1.0.1g-0.22.1.ppc64", product: { name: "libopenssl1-devel-1.0.1g-0.22.1.ppc64", product_id: "libopenssl1-devel-1.0.1g-0.22.1.ppc64", }, }, { category: "product_version", name: "libopenssl1_0_0-1.0.1g-0.22.1.ppc64", product: { name: "libopenssl1_0_0-1.0.1g-0.22.1.ppc64", product_id: "libopenssl1_0_0-1.0.1g-0.22.1.ppc64", }, }, { category: "product_version", name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", product: { name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", product_id: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", }, }, { category: "product_version", name: "openssl1-1.0.1g-0.22.1.ppc64", product: { name: "openssl1-1.0.1g-0.22.1.ppc64", product_id: "openssl1-1.0.1g-0.22.1.ppc64", }, }, { category: "product_version", name: "openssl1-doc-1.0.1g-0.22.1.ppc64", product: { name: "openssl1-doc-1.0.1g-0.22.1.ppc64", product_id: "openssl1-doc-1.0.1g-0.22.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "libopenssl1-devel-1.0.1g-0.22.1.s390x", product: { name: "libopenssl1-devel-1.0.1g-0.22.1.s390x", product_id: "libopenssl1-devel-1.0.1g-0.22.1.s390x", }, }, { category: "product_version", name: "libopenssl1_0_0-1.0.1g-0.22.1.s390x", product: { name: "libopenssl1_0_0-1.0.1g-0.22.1.s390x", product_id: "libopenssl1_0_0-1.0.1g-0.22.1.s390x", }, }, { category: "product_version", name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", product: { name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", product_id: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", }, }, { category: "product_version", name: "openssl1-1.0.1g-0.22.1.s390x", product: { name: "openssl1-1.0.1g-0.22.1.s390x", product_id: "openssl1-1.0.1g-0.22.1.s390x", }, }, { category: "product_version", name: "openssl1-doc-1.0.1g-0.22.1.s390x", product: { name: "openssl1-doc-1.0.1g-0.22.1.s390x", product_id: "openssl1-doc-1.0.1g-0.22.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libopenssl1-devel-1.0.1g-0.22.1.x86_64", product: { name: "libopenssl1-devel-1.0.1g-0.22.1.x86_64", product_id: "libopenssl1-devel-1.0.1g-0.22.1.x86_64", }, }, { category: "product_version", name: "libopenssl1_0_0-1.0.1g-0.22.1.x86_64", product: { name: "libopenssl1_0_0-1.0.1g-0.22.1.x86_64", product_id: "libopenssl1_0_0-1.0.1g-0.22.1.x86_64", }, }, { category: "product_version", name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", product: { name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", product_id: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", }, }, { category: "product_version", name: "openssl1-1.0.1g-0.22.1.x86_64", product: { name: "openssl1-1.0.1g-0.22.1.x86_64", product_id: "openssl1-1.0.1g-0.22.1.x86_64", }, }, { category: "product_version", name: "openssl1-doc-1.0.1g-0.22.1.x86_64", product: { name: "openssl1-doc-1.0.1g-0.22.1.x86_64", product_id: "openssl1-doc-1.0.1g-0.22.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 11-SECURITY", product: { name: "SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY", product_identification_helper: { cpe: "cpe:/o:suse:sles:11:security", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libopenssl1-devel-1.0.1g-0.22.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", }, product_reference: "libopenssl1-devel-1.0.1g-0.22.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1-devel-1.0.1g-0.22.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", }, product_reference: "libopenssl1-devel-1.0.1g-0.22.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1-devel-1.0.1g-0.22.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", }, product_reference: "libopenssl1-devel-1.0.1g-0.22.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1-devel-1.0.1g-0.22.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", }, product_reference: "libopenssl1-devel-1.0.1g-0.22.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1-devel-1.0.1g-0.22.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", }, product_reference: "libopenssl1-devel-1.0.1g-0.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1_0_0-1.0.1g-0.22.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", }, product_reference: "libopenssl1_0_0-1.0.1g-0.22.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1_0_0-1.0.1g-0.22.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", }, product_reference: "libopenssl1_0_0-1.0.1g-0.22.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1_0_0-1.0.1g-0.22.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", }, product_reference: "libopenssl1_0_0-1.0.1g-0.22.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1_0_0-1.0.1g-0.22.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", }, product_reference: "libopenssl1_0_0-1.0.1g-0.22.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1_0_0-1.0.1g-0.22.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", }, product_reference: "libopenssl1_0_0-1.0.1g-0.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", }, product_reference: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", }, product_reference: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", }, product_reference: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", }, product_reference: "libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "openssl1-1.0.1g-0.22.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", }, product_reference: "openssl1-1.0.1g-0.22.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "openssl1-1.0.1g-0.22.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", }, product_reference: "openssl1-1.0.1g-0.22.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "openssl1-1.0.1g-0.22.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", }, product_reference: "openssl1-1.0.1g-0.22.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "openssl1-1.0.1g-0.22.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", }, product_reference: "openssl1-1.0.1g-0.22.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "openssl1-1.0.1g-0.22.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", }, product_reference: "openssl1-1.0.1g-0.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "openssl1-doc-1.0.1g-0.22.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", }, product_reference: "openssl1-doc-1.0.1g-0.22.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "openssl1-doc-1.0.1g-0.22.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", }, product_reference: "openssl1-doc-1.0.1g-0.22.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "openssl1-doc-1.0.1g-0.22.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", }, product_reference: "openssl1-doc-1.0.1g-0.22.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "openssl1-doc-1.0.1g-0.22.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", }, product_reference: "openssl1-doc-1.0.1g-0.22.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, { category: "default_component_of", full_product_name: { name: "openssl1-doc-1.0.1g-0.22.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", }, product_reference: "openssl1-doc-1.0.1g-0.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY", }, ], }, vulnerabilities: [ { cve: "CVE-2010-5298", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-5298", }, ], notes: [ { category: "general", text: "Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-5298", url: "https://www.suse.com/security/cve/CVE-2010-5298", }, { category: "external", summary: "SUSE Bug 873351 for CVE-2010-5298", url: "https://bugzilla.suse.com/873351", }, { category: "external", summary: "SUSE Bug 880891 for CVE-2010-5298", url: "https://bugzilla.suse.com/880891", }, { category: "external", summary: "SUSE Bug 883126 for CVE-2010-5298", url: "https://bugzilla.suse.com/883126", }, { category: "external", summary: "SUSE Bug 885777 for CVE-2010-5298", url: "https://bugzilla.suse.com/885777", }, { category: "external", summary: "SUSE Bug 915913 for CVE-2010-5298", url: "https://bugzilla.suse.com/915913", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "low", }, ], title: "CVE-2010-5298", }, { cve: "CVE-2014-0160", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0160", }, ], notes: [ { category: "general", text: "The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0160", url: "https://www.suse.com/security/cve/CVE-2014-0160", }, { category: "external", summary: "SUSE Bug 872299 for CVE-2014-0160", url: "https://bugzilla.suse.com/872299", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-0160", }, { cve: "CVE-2014-0195", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0195", }, ], notes: [ { category: "general", text: "The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0195", url: "https://www.suse.com/security/cve/CVE-2014-0195", }, { category: "external", summary: "SUSE Bug 880891 for CVE-2014-0195", url: "https://bugzilla.suse.com/880891", }, { category: "external", summary: "SUSE Bug 885777 for CVE-2014-0195", url: "https://bugzilla.suse.com/885777", }, { category: "external", summary: "SUSE Bug 915913 for CVE-2014-0195", url: "https://bugzilla.suse.com/915913", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2014-0195", }, { cve: "CVE-2014-0198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0198", }, ], notes: [ { category: "general", text: "The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0198", url: "https://www.suse.com/security/cve/CVE-2014-0198", }, { category: "external", summary: "SUSE Bug 876282 for CVE-2014-0198", url: "https://bugzilla.suse.com/876282", }, { category: "external", summary: "SUSE Bug 880891 for CVE-2014-0198", url: "https://bugzilla.suse.com/880891", }, { category: "external", summary: "SUSE Bug 885777 for CVE-2014-0198", url: "https://bugzilla.suse.com/885777", }, { category: "external", summary: "SUSE Bug 915913 for CVE-2014-0198", url: "https://bugzilla.suse.com/915913", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2014-0198", }, { cve: "CVE-2014-0221", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0221", }, ], notes: [ { category: "general", text: "The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0221", url: "https://www.suse.com/security/cve/CVE-2014-0221", }, { category: "external", summary: "SUSE Bug 880891 for CVE-2014-0221", url: "https://bugzilla.suse.com/880891", }, { category: "external", summary: "SUSE Bug 883126 for CVE-2014-0221", url: "https://bugzilla.suse.com/883126", }, { category: "external", summary: "SUSE Bug 885777 for CVE-2014-0221", url: "https://bugzilla.suse.com/885777", }, { category: "external", summary: "SUSE Bug 905106 for CVE-2014-0221", url: "https://bugzilla.suse.com/905106", }, { category: "external", summary: "SUSE Bug 915913 for CVE-2014-0221", url: "https://bugzilla.suse.com/915913", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2014-0221", }, { cve: "CVE-2014-0224", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0224", }, ], notes: [ { category: "general", text: "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0224", url: "https://www.suse.com/security/cve/CVE-2014-0224", }, { category: "external", summary: "SUSE Bug 1146657 for CVE-2014-0224", url: "https://bugzilla.suse.com/1146657", }, { category: "external", summary: "SUSE Bug 880891 for CVE-2014-0224", url: "https://bugzilla.suse.com/880891", }, { category: "external", summary: "SUSE Bug 881743 for CVE-2014-0224", url: "https://bugzilla.suse.com/881743", }, { category: "external", summary: "SUSE Bug 883126 for CVE-2014-0224", url: "https://bugzilla.suse.com/883126", }, { category: "external", summary: "SUSE Bug 885777 for CVE-2014-0224", url: "https://bugzilla.suse.com/885777", }, { category: "external", summary: "SUSE Bug 892403 for CVE-2014-0224", url: "https://bugzilla.suse.com/892403", }, { category: "external", summary: "SUSE Bug 901237 for CVE-2014-0224", url: "https://bugzilla.suse.com/901237", }, { category: "external", summary: "SUSE Bug 903703 for CVE-2014-0224", url: "https://bugzilla.suse.com/903703", }, { category: "external", summary: "SUSE Bug 905018 for CVE-2014-0224", url: "https://bugzilla.suse.com/905018", }, { category: "external", summary: "SUSE Bug 905106 for CVE-2014-0224", url: "https://bugzilla.suse.com/905106", }, { category: "external", summary: "SUSE Bug 914447 for CVE-2014-0224", url: "https://bugzilla.suse.com/914447", }, { category: "external", summary: "SUSE Bug 915913 for CVE-2014-0224", url: "https://bugzilla.suse.com/915913", }, { category: "external", summary: "SUSE Bug 916239 for CVE-2014-0224", url: "https://bugzilla.suse.com/916239", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-0224", }, { cve: "CVE-2014-3470", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3470", }, ], notes: [ { category: "general", text: "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3470", url: "https://www.suse.com/security/cve/CVE-2014-3470", }, { category: "external", summary: "SUSE Bug 880891 for CVE-2014-3470", url: "https://bugzilla.suse.com/880891", }, { category: "external", summary: "SUSE Bug 883126 for CVE-2014-3470", url: "https://bugzilla.suse.com/883126", }, { category: "external", summary: "SUSE Bug 885777 for CVE-2014-3470", url: "https://bugzilla.suse.com/885777", }, { category: "external", summary: "SUSE Bug 905106 for CVE-2014-3470", url: "https://bugzilla.suse.com/905106", }, { category: "external", summary: "SUSE Bug 915913 for CVE-2014-3470", url: "https://bugzilla.suse.com/915913", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2014-3470", }, { cve: "CVE-2014-3505", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3505", }, ], notes: [ { category: "general", text: "Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3505", url: "https://www.suse.com/security/cve/CVE-2014-3505", }, { category: "external", summary: "SUSE Bug 890759 for CVE-2014-3505", url: "https://bugzilla.suse.com/890759", }, { category: "external", summary: "SUSE Bug 890764 for CVE-2014-3505", url: "https://bugzilla.suse.com/890764", }, { category: "external", summary: "SUSE Bug 890767 for CVE-2014-3505", url: "https://bugzilla.suse.com/890767", }, { category: "external", summary: "SUSE Bug 905106 for CVE-2014-3505", url: "https://bugzilla.suse.com/905106", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-3505", }, { cve: "CVE-2014-3506", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3506", }, ], notes: [ { category: "general", text: "d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3506", url: "https://www.suse.com/security/cve/CVE-2014-3506", }, { category: "external", summary: "SUSE Bug 890759 for CVE-2014-3506", url: "https://bugzilla.suse.com/890759", }, { category: "external", summary: "SUSE Bug 890764 for CVE-2014-3506", url: "https://bugzilla.suse.com/890764", }, { category: "external", summary: "SUSE Bug 890768 for CVE-2014-3506", url: "https://bugzilla.suse.com/890768", }, { category: "external", summary: "SUSE Bug 905106 for CVE-2014-3506", url: "https://bugzilla.suse.com/905106", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-3506", }, { cve: "CVE-2014-3507", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3507", }, ], notes: [ { category: "general", text: "Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3507", url: "https://www.suse.com/security/cve/CVE-2014-3507", }, { category: "external", summary: "SUSE Bug 890759 for CVE-2014-3507", url: "https://bugzilla.suse.com/890759", }, { category: "external", summary: "SUSE Bug 890764 for CVE-2014-3507", url: "https://bugzilla.suse.com/890764", }, { category: "external", summary: "SUSE Bug 890769 for CVE-2014-3507", url: "https://bugzilla.suse.com/890769", }, { category: "external", summary: "SUSE Bug 905106 for CVE-2014-3507", url: "https://bugzilla.suse.com/905106", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-3507", }, { cve: "CVE-2014-3508", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3508", }, ], notes: [ { category: "general", text: "The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3508", url: "https://www.suse.com/security/cve/CVE-2014-3508", }, { category: "external", summary: "SUSE Bug 890759 for CVE-2014-3508", url: "https://bugzilla.suse.com/890759", }, { category: "external", summary: "SUSE Bug 890764 for CVE-2014-3508", url: "https://bugzilla.suse.com/890764", }, { category: "external", summary: "SUSE Bug 905106 for CVE-2014-3508", url: "https://bugzilla.suse.com/905106", }, { category: "external", summary: "SUSE Bug 950708 for CVE-2014-3508", url: "https://bugzilla.suse.com/950708", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-3508", }, { cve: "CVE-2014-3509", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3509", }, ], notes: [ { category: "general", text: "Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3509", url: "https://www.suse.com/security/cve/CVE-2014-3509", }, { category: "external", summary: "SUSE Bug 890759 for CVE-2014-3509", url: "https://bugzilla.suse.com/890759", }, { category: "external", summary: "SUSE Bug 890766 for CVE-2014-3509", url: "https://bugzilla.suse.com/890766", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-3509", }, { cve: "CVE-2014-3510", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3510", }, ], notes: [ { category: "general", text: "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3510", url: "https://www.suse.com/security/cve/CVE-2014-3510", }, { category: "external", summary: "SUSE Bug 890759 for CVE-2014-3510", url: "https://bugzilla.suse.com/890759", }, { category: "external", summary: "SUSE Bug 890764 for CVE-2014-3510", url: "https://bugzilla.suse.com/890764", }, { category: "external", summary: "SUSE Bug 890770 for CVE-2014-3510", url: "https://bugzilla.suse.com/890770", }, { category: "external", summary: "SUSE Bug 905106 for CVE-2014-3510", url: "https://bugzilla.suse.com/905106", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-3510", }, { cve: "CVE-2014-3511", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3511", }, ], notes: [ { category: "general", text: "The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a \"protocol downgrade\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3511", url: "https://www.suse.com/security/cve/CVE-2014-3511", }, { category: "external", summary: "SUSE Bug 890759 for CVE-2014-3511", url: "https://bugzilla.suse.com/890759", }, { category: "external", summary: "SUSE Bug 890771 for CVE-2014-3511", url: "https://bugzilla.suse.com/890771", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-3511", }, { cve: "CVE-2014-3512", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3512", }, ], notes: [ { category: "general", text: "Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3512", url: "https://www.suse.com/security/cve/CVE-2014-3512", }, { category: "external", summary: "SUSE Bug 890759 for CVE-2014-3512", url: "https://bugzilla.suse.com/890759", }, { category: "external", summary: "SUSE Bug 890772 for CVE-2014-3512", url: "https://bugzilla.suse.com/890772", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-3512", }, { cve: "CVE-2014-3513", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3513", }, ], notes: [ { category: "general", text: "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3513", url: "https://www.suse.com/security/cve/CVE-2014-3513", }, { category: "external", summary: "SUSE Bug 901277 for CVE-2014-3513", url: "https://bugzilla.suse.com/901277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2014-3513", }, { cve: "CVE-2014-3566", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3566", }, ], notes: [ { category: "general", text: "The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the \"POODLE\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3566", url: "https://www.suse.com/security/cve/CVE-2014-3566", }, { category: "external", summary: "SUSE Bug 1011293 for CVE-2014-3566", url: "https://bugzilla.suse.com/1011293", }, { category: "external", summary: "SUSE Bug 1031023 for CVE-2014-3566", url: "https://bugzilla.suse.com/1031023", }, { category: "external", summary: "SUSE Bug 901223 for CVE-2014-3566", url: "https://bugzilla.suse.com/901223", }, { category: "external", summary: "SUSE Bug 901254 for CVE-2014-3566", url: "https://bugzilla.suse.com/901254", }, { category: "external", summary: "SUSE Bug 901277 for CVE-2014-3566", url: "https://bugzilla.suse.com/901277", }, { category: "external", summary: "SUSE Bug 901748 for CVE-2014-3566", url: "https://bugzilla.suse.com/901748", }, { category: "external", summary: "SUSE Bug 901757 for CVE-2014-3566", url: "https://bugzilla.suse.com/901757", }, { category: "external", summary: "SUSE Bug 901759 for CVE-2014-3566", url: "https://bugzilla.suse.com/901759", }, { category: "external", summary: "SUSE Bug 901889 for CVE-2014-3566", url: "https://bugzilla.suse.com/901889", }, { category: "external", summary: "SUSE Bug 901968 for CVE-2014-3566", url: "https://bugzilla.suse.com/901968", }, { category: "external", summary: "SUSE Bug 902229 for CVE-2014-3566", url: "https://bugzilla.suse.com/902229", }, { category: "external", summary: "SUSE Bug 902233 for CVE-2014-3566", url: "https://bugzilla.suse.com/902233", }, { category: "external", summary: "SUSE Bug 902476 for CVE-2014-3566", url: "https://bugzilla.suse.com/902476", }, { category: "external", summary: "SUSE Bug 903405 for CVE-2014-3566", url: "https://bugzilla.suse.com/903405", }, { category: "external", summary: "SUSE Bug 903684 for CVE-2014-3566", url: "https://bugzilla.suse.com/903684", }, { category: "external", summary: "SUSE Bug 904889 for CVE-2014-3566", url: "https://bugzilla.suse.com/904889", }, { category: "external", summary: "SUSE Bug 905106 for CVE-2014-3566", url: "https://bugzilla.suse.com/905106", }, { category: "external", summary: "SUSE Bug 914041 for CVE-2014-3566", url: "https://bugzilla.suse.com/914041", }, { category: "external", summary: "SUSE Bug 994144 for CVE-2014-3566", url: "https://bugzilla.suse.com/994144", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "critical", }, ], title: "CVE-2014-3566", }, { cve: "CVE-2014-3567", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3567", }, ], notes: [ { category: "general", text: "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3567", url: "https://www.suse.com/security/cve/CVE-2014-3567", }, { category: "external", summary: "SUSE Bug 877506 for CVE-2014-3567", url: "https://bugzilla.suse.com/877506", }, { category: "external", summary: "SUSE Bug 901277 for CVE-2014-3567", url: "https://bugzilla.suse.com/901277", }, { category: "external", summary: "SUSE Bug 905106 for CVE-2014-3567", url: "https://bugzilla.suse.com/905106", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-3567", }, { cve: "CVE-2014-3568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3568", }, ], notes: [ { category: "general", text: "OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3568", url: "https://www.suse.com/security/cve/CVE-2014-3568", }, { category: "external", summary: "SUSE Bug 901277 for CVE-2014-3568", url: "https://bugzilla.suse.com/901277", }, { category: "external", summary: "SUSE Bug 905106 for CVE-2014-3568", url: "https://bugzilla.suse.com/905106", }, { category: "external", summary: "SUSE Bug 911399 for CVE-2014-3568", url: "https://bugzilla.suse.com/911399", }, { category: "external", summary: "SUSE Bug 986238 for CVE-2014-3568", url: "https://bugzilla.suse.com/986238", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2014-3568", }, { cve: "CVE-2014-3570", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3570", }, ], notes: [ { category: "general", text: "The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3570", url: "https://www.suse.com/security/cve/CVE-2014-3570", }, { category: "external", summary: "SUSE Bug 912296 for CVE-2014-3570", url: "https://bugzilla.suse.com/912296", }, { category: "external", summary: "SUSE Bug 915848 for CVE-2014-3570", url: "https://bugzilla.suse.com/915848", }, { category: "external", summary: "SUSE Bug 927623 for CVE-2014-3570", url: "https://bugzilla.suse.com/927623", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2014-3570", url: "https://bugzilla.suse.com/937891", }, { category: "external", summary: "SUSE Bug 944456 for CVE-2014-3570", url: "https://bugzilla.suse.com/944456", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2014-3570", }, { cve: "CVE-2014-3571", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3571", }, ], notes: [ { category: "general", text: "OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3571", url: "https://www.suse.com/security/cve/CVE-2014-3571", }, { category: "external", summary: "SUSE Bug 912294 for CVE-2014-3571", url: "https://bugzilla.suse.com/912294", }, { category: "external", summary: "SUSE Bug 915848 for CVE-2014-3571", url: "https://bugzilla.suse.com/915848", }, { category: "external", summary: "SUSE Bug 927623 for CVE-2014-3571", url: "https://bugzilla.suse.com/927623", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2014-3571", }, { cve: "CVE-2014-3572", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3572", }, ], notes: [ { category: "general", text: "The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3572", url: "https://www.suse.com/security/cve/CVE-2014-3572", }, { category: "external", summary: "SUSE Bug 912015 for CVE-2014-3572", url: "https://bugzilla.suse.com/912015", }, { category: "external", summary: "SUSE Bug 915848 for CVE-2014-3572", url: "https://bugzilla.suse.com/915848", }, { category: "external", summary: "SUSE Bug 927623 for CVE-2014-3572", url: "https://bugzilla.suse.com/927623", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2014-3572", url: "https://bugzilla.suse.com/937891", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2014-3572", }, { cve: "CVE-2014-5139", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-5139", }, ], notes: [ { category: "general", text: "The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-5139", url: "https://www.suse.com/security/cve/CVE-2014-5139", }, { category: "external", summary: "SUSE Bug 886831 for CVE-2014-5139", url: "https://bugzilla.suse.com/886831", }, { category: "external", summary: "SUSE Bug 890759 for CVE-2014-5139", url: "https://bugzilla.suse.com/890759", }, { category: "external", summary: "SUSE Bug 890765 for CVE-2014-5139", url: "https://bugzilla.suse.com/890765", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-5139", }, { cve: "CVE-2014-8176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8176", }, ], notes: [ { category: "general", text: "The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8176", url: "https://www.suse.com/security/cve/CVE-2014-8176", }, { category: "external", summary: "SUSE Bug 1148697 for CVE-2014-8176", url: "https://bugzilla.suse.com/1148697", }, { category: "external", summary: "SUSE Bug 934494 for CVE-2014-8176", url: "https://bugzilla.suse.com/934494", }, { category: "external", summary: "SUSE Bug 934666 for CVE-2014-8176", url: "https://bugzilla.suse.com/934666", }, { category: "external", summary: "SUSE Bug 986238 for CVE-2014-8176", url: "https://bugzilla.suse.com/986238", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2014-8176", }, { cve: "CVE-2014-8275", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8275", }, ], notes: [ { category: "general", text: "OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8275", url: "https://www.suse.com/security/cve/CVE-2014-8275", }, { category: "external", summary: "SUSE Bug 912018 for CVE-2014-8275", url: "https://bugzilla.suse.com/912018", }, { category: "external", summary: "SUSE Bug 915848 for CVE-2014-8275", url: "https://bugzilla.suse.com/915848", }, { category: "external", summary: "SUSE Bug 927623 for CVE-2014-8275", url: "https://bugzilla.suse.com/927623", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2014-8275", url: "https://bugzilla.suse.com/937891", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2014-8275", }, { cve: "CVE-2015-0204", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0204", }, ], notes: [ { category: "general", text: "The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the \"FREAK\" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0204", url: "https://www.suse.com/security/cve/CVE-2015-0204", }, { category: "external", summary: "SUSE Bug 912014 for CVE-2015-0204", url: "https://bugzilla.suse.com/912014", }, { category: "external", summary: "SUSE Bug 920482 for CVE-2015-0204", url: "https://bugzilla.suse.com/920482", }, { category: "external", summary: "SUSE Bug 920484 for CVE-2015-0204", url: "https://bugzilla.suse.com/920484", }, { category: "external", summary: "SUSE Bug 927591 for CVE-2015-0204", url: "https://bugzilla.suse.com/927591", }, { category: "external", summary: "SUSE Bug 927623 for CVE-2015-0204", url: "https://bugzilla.suse.com/927623", }, { category: "external", summary: "SUSE Bug 936787 for CVE-2015-0204", url: "https://bugzilla.suse.com/936787", }, { category: "external", summary: "SUSE Bug 952088 for CVE-2015-0204", url: "https://bugzilla.suse.com/952088", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "critical", }, ], title: "CVE-2015-0204", }, { cve: "CVE-2015-0205", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0205", }, ], notes: [ { category: "general", text: "The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0205", url: "https://www.suse.com/security/cve/CVE-2015-0205", }, { category: "external", summary: "SUSE Bug 912293 for CVE-2015-0205", url: "https://bugzilla.suse.com/912293", }, { category: "external", summary: "SUSE Bug 915848 for CVE-2015-0205", url: "https://bugzilla.suse.com/915848", }, { category: "external", summary: "SUSE Bug 927623 for CVE-2015-0205", url: "https://bugzilla.suse.com/927623", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2015-0205", url: "https://bugzilla.suse.com/937891", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2015-0205", }, { cve: "CVE-2015-0206", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0206", }, ], notes: [ { category: "general", text: "Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0206", url: "https://www.suse.com/security/cve/CVE-2015-0206", }, { category: "external", summary: "SUSE Bug 912292 for CVE-2015-0206", url: "https://bugzilla.suse.com/912292", }, { category: "external", summary: "SUSE Bug 927623 for CVE-2015-0206", url: "https://bugzilla.suse.com/927623", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2015-0206", url: "https://bugzilla.suse.com/937891", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2015-0206", }, { cve: "CVE-2015-0209", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0209", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0209", url: "https://www.suse.com/security/cve/CVE-2015-0209", }, { category: "external", summary: "SUSE Bug 919648 for CVE-2015-0209", url: "https://bugzilla.suse.com/919648", }, { category: "external", summary: "SUSE Bug 936586 for CVE-2015-0209", url: "https://bugzilla.suse.com/936586", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2015-0209", url: "https://bugzilla.suse.com/937891", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "critical", }, ], title: "CVE-2015-0209", }, { cve: "CVE-2015-0286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0286", }, ], notes: [ { category: "general", text: "The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0286", url: "https://www.suse.com/security/cve/CVE-2015-0286", }, { category: "external", summary: "SUSE Bug 919648 for CVE-2015-0286", url: "https://bugzilla.suse.com/919648", }, { category: "external", summary: "SUSE Bug 922496 for CVE-2015-0286", url: "https://bugzilla.suse.com/922496", }, { category: "external", summary: "SUSE Bug 936586 for CVE-2015-0286", url: "https://bugzilla.suse.com/936586", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2015-0286", url: "https://bugzilla.suse.com/937891", }, { category: "external", summary: "SUSE Bug 951391 for CVE-2015-0286", url: "https://bugzilla.suse.com/951391", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "critical", }, ], title: "CVE-2015-0286", }, { cve: "CVE-2015-0287", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0287", }, ], notes: [ { category: "general", text: "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0287", url: "https://www.suse.com/security/cve/CVE-2015-0287", }, { category: "external", summary: "SUSE Bug 919648 for CVE-2015-0287", url: "https://bugzilla.suse.com/919648", }, { category: "external", summary: "SUSE Bug 922499 for CVE-2015-0287", url: "https://bugzilla.suse.com/922499", }, { category: "external", summary: "SUSE Bug 936586 for CVE-2015-0287", url: "https://bugzilla.suse.com/936586", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2015-0287", url: "https://bugzilla.suse.com/937891", }, { category: "external", summary: "SUSE Bug 968888 for CVE-2015-0287", url: "https://bugzilla.suse.com/968888", }, { category: "external", summary: "SUSE Bug 991722 for CVE-2015-0287", url: "https://bugzilla.suse.com/991722", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "critical", }, ], title: "CVE-2015-0287", }, { cve: "CVE-2015-0288", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0288", }, ], notes: [ { category: "general", text: "The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0288", url: "https://www.suse.com/security/cve/CVE-2015-0288", }, { category: "external", summary: "SUSE Bug 919648 for CVE-2015-0288", url: "https://bugzilla.suse.com/919648", }, { category: "external", summary: "SUSE Bug 920236 for CVE-2015-0288", url: "https://bugzilla.suse.com/920236", }, { category: "external", summary: "SUSE Bug 936586 for CVE-2015-0288", url: "https://bugzilla.suse.com/936586", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2015-0288", url: "https://bugzilla.suse.com/937891", }, { category: "external", summary: "SUSE Bug 951391 for CVE-2015-0288", url: "https://bugzilla.suse.com/951391", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "critical", }, ], title: "CVE-2015-0288", }, { cve: "CVE-2015-0289", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0289", }, ], notes: [ { category: "general", text: "The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0289", url: "https://www.suse.com/security/cve/CVE-2015-0289", }, { category: "external", summary: "SUSE Bug 919648 for CVE-2015-0289", url: "https://bugzilla.suse.com/919648", }, { category: "external", summary: "SUSE Bug 922500 for CVE-2015-0289", url: "https://bugzilla.suse.com/922500", }, { category: "external", summary: "SUSE Bug 936586 for CVE-2015-0289", url: "https://bugzilla.suse.com/936586", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2015-0289", url: "https://bugzilla.suse.com/937891", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "critical", }, ], title: "CVE-2015-0289", }, { cve: "CVE-2015-0292", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0292", }, ], notes: [ { category: "general", text: "Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0292", url: "https://www.suse.com/security/cve/CVE-2015-0292", }, { category: "external", summary: "SUSE Bug 919648 for CVE-2015-0292", url: "https://bugzilla.suse.com/919648", }, { category: "external", summary: "SUSE Bug 922501 for CVE-2015-0292", url: "https://bugzilla.suse.com/922501", }, { category: "external", summary: "SUSE Bug 936586 for CVE-2015-0292", url: "https://bugzilla.suse.com/936586", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "critical", }, ], title: "CVE-2015-0292", }, { cve: "CVE-2015-0293", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0293", }, ], notes: [ { category: "general", text: "The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0293", url: "https://www.suse.com/security/cve/CVE-2015-0293", }, { category: "external", summary: "SUSE Bug 919648 for CVE-2015-0293", url: "https://bugzilla.suse.com/919648", }, { category: "external", summary: "SUSE Bug 922488 for CVE-2015-0293", url: "https://bugzilla.suse.com/922488", }, { category: "external", summary: "SUSE Bug 936586 for CVE-2015-0293", url: "https://bugzilla.suse.com/936586", }, { category: "external", summary: "SUSE Bug 968044 for CVE-2015-0293", url: "https://bugzilla.suse.com/968044", }, { category: "external", summary: "SUSE Bug 968051 for CVE-2015-0293", url: "https://bugzilla.suse.com/968051", }, { category: "external", summary: "SUSE Bug 968053 for CVE-2015-0293", url: "https://bugzilla.suse.com/968053", }, { category: "external", summary: "SUSE Bug 986238 for CVE-2015-0293", url: "https://bugzilla.suse.com/986238", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "critical", }, ], title: "CVE-2015-0293", }, { cve: "CVE-2015-1788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1788", }, ], notes: [ { category: "general", text: "The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1788", url: "https://www.suse.com/security/cve/CVE-2015-1788", }, { category: "external", summary: "SUSE Bug 934487 for CVE-2015-1788", url: "https://bugzilla.suse.com/934487", }, { category: "external", summary: "SUSE Bug 934666 for CVE-2015-1788", url: "https://bugzilla.suse.com/934666", }, { category: "external", summary: "SUSE Bug 936586 for CVE-2015-1788", url: "https://bugzilla.suse.com/936586", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2015-1788", url: "https://bugzilla.suse.com/937891", }, { category: "external", summary: "SUSE Bug 938432 for CVE-2015-1788", url: "https://bugzilla.suse.com/938432", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2015-1788", }, { cve: "CVE-2015-1789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1789", }, ], notes: [ { category: "general", text: "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1789", url: "https://www.suse.com/security/cve/CVE-2015-1789", }, { category: "external", summary: "SUSE Bug 934489 for CVE-2015-1789", url: "https://bugzilla.suse.com/934489", }, { category: "external", summary: "SUSE Bug 934666 for CVE-2015-1789", url: "https://bugzilla.suse.com/934666", }, { category: "external", summary: "SUSE Bug 936586 for CVE-2015-1789", url: "https://bugzilla.suse.com/936586", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2015-1789", url: "https://bugzilla.suse.com/937891", }, { category: "external", summary: "SUSE Bug 938432 for CVE-2015-1789", url: "https://bugzilla.suse.com/938432", }, { category: "external", summary: "SUSE Bug 951391 for CVE-2015-1789", url: "https://bugzilla.suse.com/951391", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2015-1789", }, { cve: "CVE-2015-1790", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1790", }, ], notes: [ { category: "general", text: "The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1790", url: "https://www.suse.com/security/cve/CVE-2015-1790", }, { category: "external", summary: "SUSE Bug 934491 for CVE-2015-1790", url: "https://bugzilla.suse.com/934491", }, { category: "external", summary: "SUSE Bug 934666 for CVE-2015-1790", url: "https://bugzilla.suse.com/934666", }, { category: "external", summary: "SUSE Bug 936586 for CVE-2015-1790", url: "https://bugzilla.suse.com/936586", }, { category: "external", summary: "SUSE Bug 938432 for CVE-2015-1790", url: "https://bugzilla.suse.com/938432", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2015-1790", }, { cve: "CVE-2015-1791", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1791", }, ], notes: [ { category: "general", text: "Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1791", url: "https://www.suse.com/security/cve/CVE-2015-1791", }, { category: "external", summary: "SUSE Bug 933911 for CVE-2015-1791", url: "https://bugzilla.suse.com/933911", }, { category: "external", summary: "SUSE Bug 934666 for CVE-2015-1791", url: "https://bugzilla.suse.com/934666", }, { category: "external", summary: "SUSE Bug 986238 for CVE-2015-1791", url: "https://bugzilla.suse.com/986238", }, { category: "external", summary: "SUSE Bug 989464 for CVE-2015-1791", url: "https://bugzilla.suse.com/989464", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2015-1791", }, { cve: "CVE-2015-1792", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1792", }, ], notes: [ { category: "general", text: "The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1792", url: "https://www.suse.com/security/cve/CVE-2015-1792", }, { category: "external", summary: "SUSE Bug 934493 for CVE-2015-1792", url: "https://bugzilla.suse.com/934493", }, { category: "external", summary: "SUSE Bug 934666 for CVE-2015-1792", url: "https://bugzilla.suse.com/934666", }, { category: "external", summary: "SUSE Bug 937891 for CVE-2015-1792", url: "https://bugzilla.suse.com/937891", }, { category: "external", summary: "SUSE Bug 986238 for CVE-2015-1792", url: "https://bugzilla.suse.com/986238", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "moderate", }, ], title: "CVE-2015-1792", }, { cve: "CVE-2015-4000", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-4000", }, ], notes: [ { category: "general", text: "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-4000", url: "https://www.suse.com/security/cve/CVE-2015-4000", }, { category: "external", summary: "SUSE Bug 1074631 for CVE-2015-4000", url: "https://bugzilla.suse.com/1074631", }, { category: "external", summary: "SUSE Bug 1211968 for CVE-2015-4000", url: "https://bugzilla.suse.com/1211968", }, { category: "external", summary: "SUSE Bug 931600 for CVE-2015-4000", url: "https://bugzilla.suse.com/931600", }, { category: "external", summary: "SUSE Bug 931698 for CVE-2015-4000", url: "https://bugzilla.suse.com/931698", }, { category: "external", summary: "SUSE Bug 931723 for CVE-2015-4000", url: "https://bugzilla.suse.com/931723", }, { category: "external", summary: "SUSE Bug 931845 for CVE-2015-4000", url: "https://bugzilla.suse.com/931845", }, { category: "external", summary: "SUSE Bug 932026 for CVE-2015-4000", url: "https://bugzilla.suse.com/932026", }, { category: "external", summary: "SUSE Bug 932483 for CVE-2015-4000", url: "https://bugzilla.suse.com/932483", }, { category: "external", summary: "SUSE Bug 934789 for CVE-2015-4000", url: "https://bugzilla.suse.com/934789", }, { category: "external", summary: "SUSE Bug 935033 for CVE-2015-4000", url: "https://bugzilla.suse.com/935033", }, { category: "external", summary: "SUSE Bug 935540 for CVE-2015-4000", url: "https://bugzilla.suse.com/935540", }, { category: "external", summary: "SUSE Bug 935979 for CVE-2015-4000", url: "https://bugzilla.suse.com/935979", }, { category: "external", summary: "SUSE Bug 937202 for CVE-2015-4000", url: "https://bugzilla.suse.com/937202", }, { category: "external", summary: "SUSE Bug 937766 for CVE-2015-4000", url: "https://bugzilla.suse.com/937766", }, { category: "external", summary: "SUSE Bug 938248 for CVE-2015-4000", url: "https://bugzilla.suse.com/938248", }, { category: "external", summary: "SUSE Bug 938432 for CVE-2015-4000", url: "https://bugzilla.suse.com/938432", }, { category: "external", summary: "SUSE Bug 938895 for CVE-2015-4000", url: "https://bugzilla.suse.com/938895", }, { category: "external", summary: "SUSE Bug 938905 for CVE-2015-4000", url: "https://bugzilla.suse.com/938905", }, { category: "external", summary: "SUSE Bug 938906 for CVE-2015-4000", url: "https://bugzilla.suse.com/938906", }, { category: "external", summary: "SUSE Bug 938913 for CVE-2015-4000", url: "https://bugzilla.suse.com/938913", }, { category: "external", summary: "SUSE Bug 938945 for CVE-2015-4000", url: "https://bugzilla.suse.com/938945", }, { category: "external", summary: "SUSE Bug 943664 for CVE-2015-4000", url: "https://bugzilla.suse.com/943664", }, { category: "external", summary: "SUSE Bug 944729 for CVE-2015-4000", url: "https://bugzilla.suse.com/944729", }, { category: "external", summary: "SUSE Bug 945582 for CVE-2015-4000", url: "https://bugzilla.suse.com/945582", }, { category: "external", summary: "SUSE Bug 955589 for CVE-2015-4000", url: "https://bugzilla.suse.com/955589", }, { category: "external", summary: "SUSE Bug 980406 for CVE-2015-4000", url: "https://bugzilla.suse.com/980406", }, { category: "external", summary: "SUSE Bug 990592 for CVE-2015-4000", url: "https://bugzilla.suse.com/990592", }, { category: "external", summary: "SUSE Bug 994144 for CVE-2015-4000", url: "https://bugzilla.suse.com/994144", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2014-10-22T23:22:56Z", details: "important", }, ], title: "CVE-2015-4000", }, ], }
cve-2015-0204
Vulnerability from cvelistv5
Published
2015-01-09 02:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:03:10.552Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2015:2182", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { name: "HPSBOV03318", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBGN03299", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "71936", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71936", }, { name: "SUSE-SU-2015:2192", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT204659", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150319.txt", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960769", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "HPSBMU03345", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144043644216842&w=2", }, { name: "RHSA-2015:0849", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0849.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "SUSE-SU-2015:2166", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openssl-cve20150204-weak-security(99707)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/99707", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.novell.com/security/cve/CVE-2015-0204.html", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://freakattack.com/", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", }, { name: "HPSBUX03244", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { name: "SUSE-SU-2015:1138", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "SUSE-SU-2015:2216", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa91", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", }, { name: "SUSE-SU-2015:1086", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "91787", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "RHSA-2016:1650", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1650.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "SSRT102000", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "SSRT101987", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "SUSE-SU-2015:2168", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html", }, { name: "SUSE-SU-2015:1085", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SUSE-SU-2015:1161", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", }, { name: "SSRT101885", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201503-11", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "SUSE-SU-2016:0113", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-01-08T00:00:00", descriptions: [ { lang: "en", value: "The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the \"FREAK\" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-18T12:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "SUSE-SU-2015:2182", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { name: "HPSBOV03318", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBGN03299", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "71936", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71936", }, { name: "SUSE-SU-2015:2192", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT204659", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20150319.txt", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960769", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "HPSBMU03345", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144043644216842&w=2", }, { name: "RHSA-2015:0849", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0849.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "SUSE-SU-2015:2166", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openssl-cve20150204-weak-security(99707)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/99707", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.novell.com/security/cve/CVE-2015-0204.html", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { tags: [ "x_refsource_MISC", ], url: "https://freakattack.com/", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", }, { name: "HPSBUX03244", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { name: "SUSE-SU-2015:1138", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "SUSE-SU-2015:2216", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa91", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", }, { name: "SUSE-SU-2015:1086", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "91787", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "RHSA-2016:1650", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1650.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "SSRT102000", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "SSRT101987", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "SUSE-SU-2015:2168", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html", }, { name: "SUSE-SU-2015:1085", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SUSE-SU-2015:1161", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", }, { name: "SSRT101885", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201503-11", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "SUSE-SU-2016:0113", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2015-0204", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the \"FREAK\" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SU-2015:2182", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { name: "HPSBOV03318", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBGN03299", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "71936", refsource: "BID", url: "http://www.securityfocus.com/bid/71936", }, { name: "SUSE-SU-2015:2192", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", }, { name: "HPSBMU03409", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "https://support.apple.com/HT204659", refsource: "CONFIRM", url: "https://support.apple.com/HT204659", }, { name: "https://www.openssl.org/news/secadv_20150319.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20150319.txt", }, { name: "http://www-304.ibm.com/support/docview.wss?uid=swg21960769", refsource: "CONFIRM", url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960769", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "HPSBMU03345", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144043644216842&w=2", }, { name: "RHSA-2015:0849", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0849.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "1033378", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "https://www.openssl.org/news/secadv_20150108.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "SUSE-SU-2015:2166", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openssl-cve20150204-weak-security(99707)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/99707", }, { name: "RHSA-2015:0066", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "http://support.novell.com/security/cve/CVE-2015-0204.html", refsource: "CONFIRM", url: "http://support.novell.com/security/cve/CVE-2015-0204.html", }, { name: "HPSBUX03334", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "https://freakattack.com/", refsource: "MISC", url: "https://freakattack.com/", }, { name: "MDVSA-2015:063", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", }, { name: "HPSBUX03244", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { name: "SUSE-SU-2015:1138", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "SUSE-SU-2015:2216", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "https://bto.bluecoat.com/security-advisory/sa91", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa91", }, { name: "https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0", refsource: "CONFIRM", url: "https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0", }, { name: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", refsource: "CONFIRM", url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", }, { name: "SUSE-SU-2015:1086", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", }, { name: "SUSE-SU-2015:0946", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "91787", refsource: "BID", url: "http://www.securityfocus.com/bid/91787", }, { name: "RHSA-2016:1650", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1650.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0800", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "SSRT102000", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "HPSBMU03396", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "SSRT101987", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "SUSE-SU-2015:2168", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html", }, { name: "SUSE-SU-2015:1085", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", }, { name: "https://support.citrix.com/article/CTX216642", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SUSE-SU-2015:1161", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", }, { name: "SSRT101885", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "https://bto.bluecoat.com/security-advisory/sa88", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "GLSA-201503-11", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201503-11", }, { name: "DSA-3125", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "SUSE-SU-2016:0113", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-0204", datePublished: "2015-01-09T02:00:00", dateReserved: "2014-11-18T00:00:00", dateUpdated: "2024-08-06T04:03:10.552Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-0198
Vulnerability from cvelistv5
Published
2014-05-06 10:00
Modified
2024-08-06 09:05
Severity ?
EPSS score ?
Summary
The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T09:05:39.267Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59669", }, { name: "59525", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59525", }, { name: "59282", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59282", }, { name: "59990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59990", }, { name: "59264", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59264", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.html", }, { name: "59126", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59126", }, { name: "67193", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/67193", }, { name: "59306", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59306", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1093837", }, { name: "HPSBGN03068", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2", }, { name: "59190", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59190", }, { name: "59529", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59529", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "61254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61254", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://puppetlabs.com/security/cve/cve-2014-0198", }, { name: "59449", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59449", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59300", }, { name: "58667", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58667", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "59284", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59284", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2014-0204.html", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58945", }, { name: "[5.5] 005: RELIABILITY FIX: May 1, 2014", tags: [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred", ], url: "http://www.openbsd.org/errata55.html#005_openssl", }, { name: "59440", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59440", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59655", }, { name: "59163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59163", }, { name: "DSA-2931", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2931", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "59374", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59374", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "59310", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59310", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.citrix.com/article/CTX140876", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58939", }, { name: "59514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59514", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59438", }, { name: "58714", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58714", }, { name: "HPSBHF03052", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "60066", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60066", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59301", }, { name: "openSUSE-SU-2014:0634", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-05/msg00036.html", }, { name: "59784", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59784", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "MDVSA-2014:080", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:080", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59413", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59721", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59450", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59491", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58977", }, { name: "openSUSE-SU-2014:0635", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-05/msg00037.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "60571", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60571", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.blackberry.com/btsc/KB36051", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "59202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59202", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58337", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59162", }, { name: "59398", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59398", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59490", }, { name: "60049", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60049", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-04-21T00:00:00", descriptions: [ { lang: "en", value: "The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:35", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59669", }, { name: "59525", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59525", }, { name: "59282", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59282", }, { name: "59990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59990", }, { name: "59264", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59264", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.html", }, { name: "59126", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59126", }, { name: "67193", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/67193", }, { name: "59306", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59306", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1093837", }, { name: "HPSBGN03068", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2", }, { name: "59190", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59190", }, { name: "59529", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59529", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "61254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61254", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://puppetlabs.com/security/cve/cve-2014-0198", }, { name: "59449", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59449", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59300", }, { name: "58667", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58667", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "59284", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59284", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2014-0204.html", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58945", }, { name: "[5.5] 005: RELIABILITY FIX: May 1, 2014", tags: [ "vendor-advisory", "x_refsource_OPENBSD", ], url: "http://www.openbsd.org/errata55.html#005_openssl", }, { name: "59440", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59440", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59655", }, { name: "59163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59163", }, { name: "DSA-2931", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2931", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "59374", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59374", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "59310", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59310", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.citrix.com/article/CTX140876", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58939", }, { name: "59514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59514", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59438", }, { name: "58714", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58714", }, { name: "HPSBHF03052", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "60066", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60066", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59301", }, { name: "openSUSE-SU-2014:0634", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-05/msg00036.html", }, { name: "59784", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59784", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "MDVSA-2014:080", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:080", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59413", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59721", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59450", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59491", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58977", }, { name: "openSUSE-SU-2014:0635", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-05/msg00037.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "60571", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60571", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.blackberry.com/btsc/KB36051", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "59202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59202", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58337", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59162", }, { name: "59398", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59398", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59490", }, { name: "60049", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60049", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-0198", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "59342", refsource: "SECUNIA", url: "http://secunia.com/advisories/59342", }, { name: "59669", refsource: "SECUNIA", url: "http://secunia.com/advisories/59669", }, { name: "59525", refsource: "SECUNIA", url: "http://secunia.com/advisories/59525", }, { name: "59282", refsource: "SECUNIA", url: "http://secunia.com/advisories/59282", }, { name: "59990", refsource: "SECUNIA", url: "http://secunia.com/advisories/59990", }, { name: "59264", refsource: "SECUNIA", url: "http://secunia.com/advisories/59264", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.html", }, { name: "59126", refsource: "SECUNIA", url: "http://secunia.com/advisories/59126", }, { name: "67193", refsource: "BID", url: "http://www.securityfocus.com/bid/67193", }, { name: "59306", refsource: "SECUNIA", url: "http://secunia.com/advisories/59306", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1093837", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1093837", }, { name: "HPSBGN03068", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2", }, { name: "59190", refsource: "SECUNIA", url: "http://secunia.com/advisories/59190", }, { name: "59529", refsource: "SECUNIA", url: "http://secunia.com/advisories/59529", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "61254", refsource: "SECUNIA", url: "http://secunia.com/advisories/61254", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { name: "http://puppetlabs.com/security/cve/cve-2014-0198", refsource: "CONFIRM", url: "http://puppetlabs.com/security/cve/cve-2014-0198", }, { name: "59449", refsource: "SECUNIA", url: "http://secunia.com/advisories/59449", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "HPSBMU03074", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59300", refsource: "SECUNIA", url: "http://secunia.com/advisories/59300", }, { name: "58667", refsource: "SECUNIA", url: "http://secunia.com/advisories/58667", }, { name: "GLSA-201407-05", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "59284", refsource: "SECUNIA", url: "http://secunia.com/advisories/59284", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg24037783", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "http://advisories.mageia.org/MGASA-2014-0204.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2014-0204.html", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", refsource: "SECUNIA", url: "http://secunia.com/advisories/58945", }, { name: "[5.5] 005: RELIABILITY FIX: May 1, 2014", refsource: "OPENBSD", url: "http://www.openbsd.org/errata55.html#005_openssl", }, { name: "59440", refsource: "SECUNIA", url: "http://secunia.com/advisories/59440", }, { name: "https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321", refsource: "CONFIRM", url: "https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", refsource: "SECUNIA", url: "http://secunia.com/advisories/59655", }, { name: "59163", refsource: "SECUNIA", url: "http://secunia.com/advisories/59163", }, { name: "DSA-2931", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-2931", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", refsource: "SECUNIA", url: "http://secunia.com/advisories/59437", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "59374", refsource: "SECUNIA", url: "http://secunia.com/advisories/59374", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "59310", refsource: "SECUNIA", url: "http://secunia.com/advisories/59310", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { name: "http://www.fortiguard.com/advisory/FG-IR-14-018/", refsource: "CONFIRM", url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676356", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { name: "http://support.citrix.com/article/CTX140876", refsource: "CONFIRM", url: "http://support.citrix.com/article/CTX140876", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "58939", refsource: "SECUNIA", url: "http://secunia.com/advisories/58939", }, { name: "59514", refsource: "SECUNIA", url: "http://secunia.com/advisories/59514", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", refsource: "SECUNIA", url: "http://secunia.com/advisories/59438", }, { name: "58714", refsource: "SECUNIA", url: "http://secunia.com/advisories/58714", }, { name: "HPSBHF03052", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2", }, { name: "http://www.openssl.org/news/secadv_20140605.txt", refsource: "CONFIRM", url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "60066", refsource: "SECUNIA", url: "http://secunia.com/advisories/60066", }, { name: "59301", refsource: "SECUNIA", url: "http://secunia.com/advisories/59301", }, { name: "openSUSE-SU-2014:0634", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-05/msg00036.html", }, { name: "59784", refsource: "SECUNIA", url: "http://secunia.com/advisories/59784", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA80", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "MDVSA-2014:080", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:080", }, { name: "HPSBMU03056", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "HPSBMU03051", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", refsource: "SECUNIA", url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", refsource: "SECUNIA", url: "http://secunia.com/advisories/59413", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { name: "59721", refsource: "SECUNIA", url: "http://secunia.com/advisories/59721", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "58713", refsource: "SECUNIA", url: "http://secunia.com/advisories/58713", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", refsource: "SECUNIA", url: "http://secunia.com/advisories/59450", }, { name: "59287", refsource: "SECUNIA", url: "http://secunia.com/advisories/59287", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", refsource: "SECUNIA", url: "http://secunia.com/advisories/59491", }, { name: "58977", refsource: "SECUNIA", url: "http://secunia.com/advisories/58977", }, { name: "openSUSE-SU-2014:0635", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-05/msg00037.html", }, { name: "https://www.novell.com/support/kb/doc.php?id=7015271", refsource: "CONFIRM", url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "60571", refsource: "SECUNIA", url: "http://secunia.com/advisories/60571", }, { name: "http://www.blackberry.com/btsc/KB36051", refsource: "CONFIRM", url: "http://www.blackberry.com/btsc/KB36051", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "59202", refsource: "SECUNIA", url: "http://secunia.com/advisories/59202", }, { name: "58337", refsource: "SECUNIA", url: "http://secunia.com/advisories/58337", }, { name: "59162", refsource: "SECUNIA", url: "http://secunia.com/advisories/59162", }, { name: "59398", refsource: "SECUNIA", url: "http://secunia.com/advisories/59398", }, { name: "59490", refsource: "SECUNIA", url: "http://secunia.com/advisories/59490", }, { name: "60049", refsource: "SECUNIA", url: "http://secunia.com/advisories/60049", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-0198", datePublished: "2014-05-06T10:00:00", dateReserved: "2013-12-03T00:00:00", dateUpdated: "2024-08-06T09:05:39.267Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3571
Vulnerability from cvelistv5
Published
2015-01-09 02:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:50:17.372Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "HPSBOV03318", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT204659", }, { name: "71937", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71937", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/openssl/openssl/commit/feba02f3919495e1b960c33ba849e10e77d0785d", }, { name: "FEDORA-2015-0601", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "HPSBUX03244", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SSRT101885", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "FEDORA-2015-0512", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/openssl/openssl/commit/248385c606620b29ecc96ca9d3603463f879652b", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-01-08T00:00:00", descriptions: [ { lang: "en", value: "OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-19T16:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "HPSBOV03318", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT204659", }, { name: "71937", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71937", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/openssl/openssl/commit/feba02f3919495e1b960c33ba849e10e77d0785d", }, { name: "FEDORA-2015-0601", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "HPSBUX03244", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SSRT101885", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "FEDORA-2015-0512", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/openssl/openssl/commit/248385c606620b29ecc96ca9d3603463f879652b", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3571", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "HPSBOV03318", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBMU03409", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "https://support.apple.com/HT204659", refsource: "CONFIRM", url: "https://support.apple.com/HT204659", }, { name: "71937", refsource: "BID", url: "http://www.securityfocus.com/bid/71937", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "https://github.com/openssl/openssl/commit/feba02f3919495e1b960c33ba849e10e77d0785d", refsource: "CONFIRM", url: "https://github.com/openssl/openssl/commit/feba02f3919495e1b960c33ba849e10e77d0785d", }, { name: "FEDORA-2015-0601", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "https://www.openssl.org/news/secadv_20150108.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "RHSA-2015:0066", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "HPSBUX03244", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "HPSBMU03413", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SSRT101885", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "https://bto.bluecoat.com/security-advisory/sa88", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "FEDORA-2015-0512", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", }, { name: "https://github.com/openssl/openssl/commit/248385c606620b29ecc96ca9d3603463f879652b", refsource: "CONFIRM", url: "https://github.com/openssl/openssl/commit/248385c606620b29ecc96ca9d3603463f879652b", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3571", datePublished: "2015-01-09T02:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:50:17.372Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-0293
Vulnerability from cvelistv5
Published
2015-03-19 00:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:03:10.952Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { name: "openSUSE-SU-2015:0554", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "USN-2537-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa92", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150319.txt", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202404", }, { name: "openSUSE-SU-2016:0638", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=86f8fb0e344d62454f8daf3e15236b2b59210756", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", }, { name: "SUSE-SU-2016:0621", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "FEDORA-2015-6951", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_transferred", ], url: "https://access.redhat.com/articles/1384453", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "SUSE-SU-2016:1057", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "SUSE-SU-2015:0541", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { name: "openSUSE-SU-2016:0720", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "SUSE-SU-2016:0624", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { tags: [ "x_transferred", ], url: "http://support.apple.com/kb/HT204942", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "FreeBSD-SA-15:06", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { name: "SUSE-SU-2016:0631", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "SUSE-SU-2016:0617", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "73232", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/73232", }, { name: "1031929", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "openSUSE-SU-2016:0628", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "FEDORA-2015-6855", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { name: "SUSE-SU-2016:0620", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html", }, { name: "openSUSE-SU-2016:0637", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html", }, { name: "SUSE-SU-2016:0641", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201503-11", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-03-19T00:00:00", descriptions: [ { lang: "en", value: "The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { name: "openSUSE-SU-2015:0554", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "USN-2537-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa92", }, { url: "https://www.openssl.org/news/secadv_20150319.txt", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202404", }, { name: "openSUSE-SU-2016:0638", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=86f8fb0e344d62454f8daf3e15236b2b59210756", }, { url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", }, { name: "SUSE-SU-2016:0621", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "FEDORA-2015-6951", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { url: "https://access.redhat.com/articles/1384453", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "SUSE-SU-2016:1057", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "SUSE-SU-2015:0541", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { name: "openSUSE-SU-2016:0720", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "SUSE-SU-2016:0624", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { url: "http://support.apple.com/kb/HT204942", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "FreeBSD-SA-15:06", tags: [ "vendor-advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { name: "SUSE-SU-2016:0631", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "SUSE-SU-2016:0617", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "73232", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/73232", }, { name: "1031929", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "openSUSE-SU-2016:0628", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { url: "https://support.citrix.com/article/CTX216642", }, { name: "FEDORA-2015-6855", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { name: "SUSE-SU-2016:0620", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html", }, { name: "openSUSE-SU-2016:0637", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html", }, { name: "SUSE-SU-2016:0641", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201503-11", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-0293", datePublished: "2015-03-19T00:00:00", dateReserved: "2014-11-18T00:00:00", dateUpdated: "2024-08-06T04:03:10.952Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-1792
Vulnerability from cvelistv5
Published
2015-06-12 00:00
Modified
2024-08-06 04:54
Severity ?
EPSS score ?
Summary
The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:54:16.038Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2015:1184", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", }, { name: "SSRT102180", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "DSA-3287", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { name: "SUSE-SU-2015:1150", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { tags: [ "x_transferred", ], url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965", }, { tags: [ "x_transferred", ], url: "https://openssl.org/news/secadv/20150611.txt", }, { name: "RHSA-2015:1115", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1115.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "SUSE-SU-2015:1182", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "SUSE-SU-2015:1143", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "1032564", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032564", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015", }, { name: "FEDORA-2015-10108", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "APPLE-SA-2015-08-13-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "USN-2639-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2639-1", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "75154", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/75154", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201506-02", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044", }, { name: "91787", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { tags: [ "x_transferred", ], url: "https://github.com/openssl/openssl/commit/cd30f03ac5bf2962f44bd02ae8d88245dff2f12c", }, { name: "HPSBUX03388", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", }, { name: "FEDORA-2015-10047", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT205031", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694", }, { name: "openSUSE-SU-2015:1139", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa98", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", "x_transferred", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150611.txt", }, { name: "HPSBGN03371", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143654156615516&w=2", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-06-11T00:00:00", descriptions: [ { lang: "en", value: "The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "SUSE-SU-2015:1184", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", }, { name: "SSRT102180", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "DSA-3287", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { name: "SUSE-SU-2015:1150", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965", }, { url: "https://openssl.org/news/secadv/20150611.txt", }, { name: "RHSA-2015:1115", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1115.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "SUSE-SU-2015:1182", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "SUSE-SU-2015:1143", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "1032564", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032564", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015", }, { name: "FEDORA-2015-10108", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "APPLE-SA-2015-08-13-2", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "USN-2639-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2639-1", }, { url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "75154", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/75154", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201506-02", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044", }, { name: "91787", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91787", }, { url: "https://github.com/openssl/openssl/commit/cd30f03ac5bf2962f44bd02ae8d88245dff2f12c", }, { name: "HPSBUX03388", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", }, { name: "FEDORA-2015-10047", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html", }, { url: "https://support.apple.com/kb/HT205031", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { url: "https://support.citrix.com/article/CTX216642", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694", }, { name: "openSUSE-SU-2015:1139", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa98", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { url: "https://www.openssl.org/news/secadv_20150611.txt", }, { name: "HPSBGN03371", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143654156615516&w=2", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-1792", datePublished: "2015-06-12T00:00:00", dateReserved: "2015-02-17T00:00:00", dateUpdated: "2024-08-06T04:54:16.038Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-0205
Vulnerability from cvelistv5
Published
2015-01-09 02:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:03:10.459Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openssl-cve20150205-sec-bypass(99708)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/99708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "71941", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71941", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "FEDORA-2015-0601", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "91787", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "FEDORA-2015-0512", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-01-08T00:00:00", descriptions: [ { lang: "en", value: "The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-14T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "openssl-cve20150205-sec-bypass(99708)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/99708", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "71941", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71941", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "FEDORA-2015-0601", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "91787", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91787", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "FEDORA-2015-0512", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2015-0205", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openssl-cve20150205-sec-bypass(99708)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/99708", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3", refsource: "CONFIRM", url: "https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3", }, { name: "HPSBMU03409", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "71941", refsource: "BID", url: "http://www.securityfocus.com/bid/71941", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "FEDORA-2015-0601", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "https://www.openssl.org/news/secadv_20150108.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "MDVSA-2015:019", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "RHSA-2015:0066", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "91787", refsource: "BID", url: "http://www.securityfocus.com/bid/91787", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "https://support.citrix.com/article/CTX216642", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "https://bto.bluecoat.com/security-advisory/sa88", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "FEDORA-2015-0512", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-0205", datePublished: "2015-01-09T02:00:00", dateReserved: "2014-11-18T00:00:00", dateUpdated: "2024-08-06T04:03:10.459Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-5139
Vulnerability from cvelistv5
Published
2014-08-13 23:00
Modified
2024-08-06 11:34
Severity ?
EPSS score ?
Summary
The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T11:34:37.376Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61017", }, { name: "SSRT101818", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "HPSBMU03259", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624619906067&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "69077", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/69077", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60803", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=80bd7b41b30af6ee96f519e629463583318de3b0", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59700", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60917", }, { name: "HPSBMU03216", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.tenable.com/security/tns-2014-06", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60921", }, { name: "60810", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60810", }, { name: "HPSBMU03283", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61775", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "SSRT101921", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59756", }, { name: "HPSBMU03262", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "61392", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61392", }, { name: "SSRT101916", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "61171", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61171", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=83764a989dcc87fbea337da5f8f86806fe767b7e", }, { name: "SSRT101922", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624619906067", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-06T00:00:00", descriptions: [ { lang: "en", value: "The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-01-04T20:57:01", orgId: "37e5125f-f79b-445b-8fad-9564f167944b", shortName: "certcc", }, references: [ { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61017", }, { name: "SSRT101818", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "HPSBMU03259", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624619906067&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "69077", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/69077", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60803", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=80bd7b41b30af6ee96f519e629463583318de3b0", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59700", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60917", }, { name: "HPSBMU03216", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.tenable.com/security/tns-2014-06", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60921", }, { name: "60810", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60810", }, { name: "HPSBMU03283", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61775", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "SSRT101921", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59756", }, { name: "HPSBMU03262", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "61392", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61392", }, { name: "SSRT101916", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "61171", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61171", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=83764a989dcc87fbea337da5f8f86806fe767b7e", }, { name: "SSRT101922", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624619906067", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cert@cert.org", ID: "CVE-2014-5139", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2014:1052", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html", }, { name: "60221", refsource: "SECUNIA", url: "http://secunia.com/advisories/60221", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "61184", refsource: "SECUNIA", url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", refsource: "SECUNIA", url: "http://secunia.com/advisories/60022", }, { name: "https://www.openssl.org/news/secadv_20140806.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", refsource: "SECUNIA", url: "http://secunia.com/advisories/61017", }, { name: "SSRT101818", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "HPSBMU03304", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "HPSBMU03259", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624619906067&w=2", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "GLSA-201412-39", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "69077", refsource: "BID", url: "http://www.securityfocus.com/bid/69077", }, { name: "HPSBMU03260", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "60803", refsource: "SECUNIA", url: "http://secunia.com/advisories/60803", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=80bd7b41b30af6ee96f519e629463583318de3b0", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=80bd7b41b30af6ee96f519e629463583318de3b0", }, { name: "59700", refsource: "SECUNIA", url: "http://secunia.com/advisories/59700", }, { name: "1030693", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1030693", }, { name: "60917", refsource: "SECUNIA", url: "http://secunia.com/advisories/60917", }, { name: "HPSBMU03216", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "http://www.tenable.com/security/tns-2014-06", refsource: "CONFIRM", url: "http://www.tenable.com/security/tns-2014-06", }, { name: "NetBSD-SA2014-008", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", refsource: "SECUNIA", url: "http://secunia.com/advisories/60493", }, { name: "59710", refsource: "SECUNIA", url: "http://secunia.com/advisories/59710", }, { name: "60921", refsource: "SECUNIA", url: "http://secunia.com/advisories/60921", }, { name: "60810", refsource: "SECUNIA", url: "http://secunia.com/advisories/60810", }, { name: "HPSBMU03283", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", refsource: "SECUNIA", url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", refsource: "FREEBSD", url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", refsource: "SECUNIA", url: "http://secunia.com/advisories/61775", }, { name: "SSRT101894", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "DSA-2998", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "HPSBMU03263", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "SSRT101921", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2", }, { name: "61959", refsource: "SECUNIA", url: "http://secunia.com/advisories/61959", }, { name: "59756", refsource: "SECUNIA", url: "http://secunia.com/advisories/59756", }, { name: "HPSBMU03262", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2", }, { name: "HPSBMU03267", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "61392", refsource: "SECUNIA", url: "http://secunia.com/advisories/61392", }, { name: "SSRT101916", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", refsource: "MLIST", url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "61171", refsource: "SECUNIA", url: "http://secunia.com/advisories/61171", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=83764a989dcc87fbea337da5f8f86806fe767b7e", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=83764a989dcc87fbea337da5f8f86806fe767b7e", }, { name: "SSRT101922", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624619906067", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b", assignerShortName: "certcc", cveId: "CVE-2014-5139", datePublished: "2014-08-13T23:00:00", dateReserved: "2014-07-30T00:00:00", dateUpdated: "2024-08-06T11:34:37.376Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3506
Vulnerability from cvelistv5
Published
2014-08-13 23:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.330Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2014:1297", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1297.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1250f12613b61758675848f6600ebd914ccd7636", }, { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60778", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61184", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127500", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "RHSA-2014:1256", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1256.html", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61040", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61017", }, { name: "61250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61250", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60803", }, { name: "69076", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/69076", }, { name: "60824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60917", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60921", }, { name: "HPSBOV03099", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { name: "59221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59221", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59756", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58962", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60684", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "openssl-cve20143506-dos(95160)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95160", }, { name: "60687", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60687", }, { name: "MDVSA-2014:158", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-06T00:00:00", descriptions: [ { lang: "en", value: "d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-28T12:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2014:1297", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1297.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1250f12613b61758675848f6600ebd914ccd7636", }, { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60778", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61184", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127500", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "RHSA-2014:1256", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1256.html", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61040", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61017", }, { name: "61250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61250", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60803", }, { name: "69076", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/69076", }, { name: "60824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60917", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60921", }, { name: "HPSBOV03099", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { name: "59221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59221", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59756", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58962", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60684", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "openssl-cve20143506-dos(95160)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95160", }, { name: "60687", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60687", }, { name: "MDVSA-2014:158", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3506", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2014:1297", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1297.html", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1250f12613b61758675848f6600ebd914ccd7636", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1250f12613b61758675848f6600ebd914ccd7636", }, { name: "openSUSE-SU-2014:1052", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1052.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", refsource: "SECUNIA", url: "http://secunia.com/advisories/60221", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", refsource: "SECUNIA", url: "http://secunia.com/advisories/60778", }, { name: "61184", refsource: "SECUNIA", url: "http://secunia.com/advisories/61184", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1127500", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127500", }, { name: "SSRT101846", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "RHSA-2014:1256", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1256.html", }, { name: "60022", refsource: "SECUNIA", url: "http://secunia.com/advisories/60022", }, { name: "https://www.openssl.org/news/secadv_20140806.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61040", refsource: "SECUNIA", url: "http://secunia.com/advisories/61040", }, { name: "61017", refsource: "SECUNIA", url: "http://secunia.com/advisories/61017", }, { name: "61250", refsource: "SECUNIA", url: "http://secunia.com/advisories/61250", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "GLSA-201412-39", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60803", refsource: "SECUNIA", url: "http://secunia.com/advisories/60803", }, { name: "69076", refsource: "BID", url: "http://www.securityfocus.com/bid/69076", }, { name: "60824", refsource: "SECUNIA", url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", refsource: "SECUNIA", url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", refsource: "SECUNIA", url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "60917", refsource: "SECUNIA", url: "http://secunia.com/advisories/60917", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html", }, { name: "NetBSD-SA2014-008", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", refsource: "SECUNIA", url: "http://secunia.com/advisories/60493", }, { name: "59710", refsource: "SECUNIA", url: "http://secunia.com/advisories/59710", }, { name: "60921", refsource: "SECUNIA", url: "http://secunia.com/advisories/60921", }, { name: "HPSBOV03099", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { name: "59221", refsource: "SECUNIA", url: "http://secunia.com/advisories/59221", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", refsource: "SECUNIA", url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", refsource: "FREEBSD", url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", refsource: "SECUNIA", url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", refsource: "SECUNIA", url: "http://secunia.com/advisories/61959", }, { name: "59756", refsource: "SECUNIA", url: "http://secunia.com/advisories/59756", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", refsource: "SECUNIA", url: "http://secunia.com/advisories/58962", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1053.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "60938", refsource: "SECUNIA", url: "http://secunia.com/advisories/60938", }, { name: "60684", refsource: "SECUNIA", url: "http://secunia.com/advisories/60684", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", refsource: "MLIST", url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "openssl-cve20143506-dos(95160)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95160", }, { name: "60687", refsource: "SECUNIA", url: "http://secunia.com/advisories/60687", }, { name: "MDVSA-2014:158", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3506", datePublished: "2014-08-13T23:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.330Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3567
Vulnerability from cvelistv5
Published
2014-10-19 01:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:50:18.055Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "HPSBOV03227", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", }, { name: "HPSBHF03300", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2", }, { name: "openSUSE-SU-2014:1331", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61130", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61130", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20141015.txt", }, { name: "1031052", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031052", }, { name: "62070", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62070", }, { name: "70586", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/70586", }, { name: "61073", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61073", }, { name: "USN-2385-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2385-1", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "DSA-3053", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-3053", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03223", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290583027876&w=2", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT205217", }, { name: "SSRT101779", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=7fd4ce6a997be5f5c9e744ac527725c2850de203", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "APPLE-SA-2015-09-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", }, { name: "SUSE-SU-2014:1357", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", }, { name: "NetBSD-SA2014-015", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAANST", }, { name: "61837", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61837", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/HT204244", }, { name: "SSRT101767", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61207", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61207", }, { name: "RHSA-2014:1652", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1652.html", }, { name: "62124", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62124", }, { name: "59627", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59627", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "61298", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61298", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "SUSE-SU-2014:1361", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html", }, { name: "HPSBMU03296", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142834685803386&w=2", }, { name: "61990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61990", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61959", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2014-0416.html", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "RHSA-2015:0126", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0126.html", }, { name: "61058", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61058", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "MDVSA-2014:203", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:203", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "62030", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62030", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "61819", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61819", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "RHSA-2014:1692", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1692.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-10-15T00:00:00", descriptions: [ { lang: "en", value: "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-14T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "HPSBOV03227", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", }, { name: "HPSBHF03300", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2", }, { name: "openSUSE-SU-2014:1331", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61130", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61130", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20141015.txt", }, { name: "1031052", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031052", }, { name: "62070", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62070", }, { name: "70586", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/70586", }, { name: "61073", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61073", }, { name: "USN-2385-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2385-1", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "DSA-3053", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-3053", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03223", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290583027876&w=2", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT205217", }, { name: "SSRT101779", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=7fd4ce6a997be5f5c9e744ac527725c2850de203", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "APPLE-SA-2015-09-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", }, { name: "SUSE-SU-2014:1357", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", }, { name: "NetBSD-SA2014-015", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.splunk.com/view/SP-CAAANST", }, { name: "61837", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61837", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/HT204244", }, { name: "SSRT101767", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61207", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61207", }, { name: "RHSA-2014:1652", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1652.html", }, { name: "62124", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62124", }, { name: "59627", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59627", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "61298", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61298", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "SUSE-SU-2014:1361", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html", }, { name: "HPSBMU03296", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142834685803386&w=2", }, { name: "61990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61990", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61959", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2014-0416.html", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "RHSA-2015:0126", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0126.html", }, { name: "61058", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61058", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "MDVSA-2014:203", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:203", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "62030", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62030", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "61819", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61819", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "RHSA-2014:1692", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1692.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3567", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "HPSBOV03227", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", }, { name: "HPSBHF03300", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2", }, { name: "openSUSE-SU-2014:1331", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "HPSBUX03162", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61130", refsource: "SECUNIA", url: "http://secunia.com/advisories/61130", }, { name: "https://www.openssl.org/news/secadv_20141015.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20141015.txt", }, { name: "1031052", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1031052", }, { name: "62070", refsource: "SECUNIA", url: "http://secunia.com/advisories/62070", }, { name: "70586", refsource: "BID", url: "http://www.securityfocus.com/bid/70586", }, { name: "61073", refsource: "SECUNIA", url: "http://secunia.com/advisories/61073", }, { name: "USN-2385-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2385-1", }, { name: "HPSBMU03304", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "GLSA-201412-39", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "DSA-3053", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-3053", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03223", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290583027876&w=2", }, { name: "SSRT101868", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "HPSBMU03260", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "https://support.apple.com/HT205217", refsource: "CONFIRM", url: "https://support.apple.com/HT205217", }, { name: "SSRT101779", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "APPLE-SA-2015-09-16-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", }, { name: "SUSE-SU-2014:1357", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", }, { name: "NetBSD-SA2014-015", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc", }, { name: "http://www.splunk.com/view/SP-CAAANST", refsource: "CONFIRM", url: "http://www.splunk.com/view/SP-CAAANST", }, { name: "61837", refsource: "SECUNIA", url: "http://secunia.com/advisories/61837", }, { name: "http://support.apple.com/HT204244", refsource: "CONFIRM", url: "http://support.apple.com/HT204244", }, { name: "SSRT101767", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61207", refsource: "SECUNIA", url: "http://secunia.com/advisories/61207", }, { name: "RHSA-2014:1652", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1652.html", }, { name: "62124", refsource: "SECUNIA", url: "http://secunia.com/advisories/62124", }, { name: "59627", refsource: "SECUNIA", url: "http://secunia.com/advisories/59627", }, { name: "SSRT101894", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "61298", refsource: "SECUNIA", url: "http://secunia.com/advisories/61298", }, { name: "HPSBMU03263", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "SUSE-SU-2014:1361", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html", }, { name: "HPSBMU03296", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142834685803386&w=2", }, { name: "61990", refsource: "SECUNIA", url: "http://secunia.com/advisories/61990", }, { name: "61959", refsource: "SECUNIA", url: "http://secunia.com/advisories/61959", }, { name: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", refsource: "CONFIRM", url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", }, { name: "http://advisories.mageia.org/MGASA-2014-0416.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2014-0416.html", }, { name: "HPSBMU03267", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "RHSA-2015:0126", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0126.html", }, { name: "61058", refsource: "SECUNIA", url: "http://secunia.com/advisories/61058", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "HPSBGN03233", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "MDVSA-2014:203", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:203", }, { name: "SSRT101739", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "62030", refsource: "SECUNIA", url: "http://secunia.com/advisories/62030", }, { name: "https://support.citrix.com/article/CTX216642", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX216642", }, { name: "APPLE-SA-2015-01-27-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "61819", refsource: "SECUNIA", url: "http://secunia.com/advisories/61819", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "RHSA-2014:1692", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1692.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3567", datePublished: "2014-10-19T01:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:50:18.055Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-1788
Vulnerability from cvelistv5
Published
2015-06-12 00:00
Modified
2024-08-06 04:54
Severity ?
EPSS score ?
Summary
The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:54:16.088Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2015:1184", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", }, { name: "SSRT102180", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "DSA-3287", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { name: "SUSE-SU-2015:1150", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { tags: [ "x_transferred", ], url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "75158", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/75158", }, { tags: [ "x_transferred", ], url: "https://openssl.org/news/secadv/20150611.txt", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "SUSE-SU-2015:1182", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "SUSE-SU-2015:1143", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "1032564", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032564", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960041", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "SUSE-SU-2015:1181", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html", }, { tags: [ "x_transferred", ], url: "https://github.com/openssl/openssl/commit/4924b37ee01f71ae19c94a8934b80eeb2f677932", }, { tags: [ "x_transferred", ], url: "http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery", }, { name: "APPLE-SA-2015-08-13-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "USN-2639-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2639-1", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201506-02", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044", }, { name: "91787", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "HPSBUX03388", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT205031", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694", }, { name: "openSUSE-SU-2015:1139", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa98", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", "x_transferred", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150611.txt", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-06-11T00:00:00", descriptions: [ { lang: "en", value: "The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "SUSE-SU-2015:1184", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", }, { name: "SSRT102180", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "DSA-3287", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { name: "SUSE-SU-2015:1150", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "75158", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/75158", }, { url: "https://openssl.org/news/secadv/20150611.txt", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "SUSE-SU-2015:1182", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "SUSE-SU-2015:1143", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "1032564", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032564", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960041", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "SUSE-SU-2015:1181", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html", }, { url: "https://github.com/openssl/openssl/commit/4924b37ee01f71ae19c94a8934b80eeb2f677932", }, { url: "http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery", }, { name: "APPLE-SA-2015-08-13-2", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "USN-2639-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2639-1", }, { url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201506-02", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044", }, { name: "91787", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "HPSBUX03388", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", }, { url: "https://support.apple.com/kb/HT205031", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { url: "https://support.citrix.com/article/CTX216642", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694", }, { name: "openSUSE-SU-2015:1139", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa98", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { url: "https://www.openssl.org/news/secadv_20150611.txt", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-1788", datePublished: "2015-06-12T00:00:00", dateReserved: "2015-02-17T00:00:00", dateUpdated: "2024-08-06T04:54:16.088Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3511
Vulnerability from cvelistv5
Published
2014-08-13 23:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.344Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61017", }, { name: "RHSA-2015:0197", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0197.html", }, { name: "60377", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60377", }, { name: "SSRT101818", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "59887", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59887", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "60890", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60890", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60803", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1030693", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "openssl-cve20143511-sec-bypass(95162)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95162", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAANHS", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60917", }, { name: "HPSBMU03216", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.tenable.com/security/tns-2014-06", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10084", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60921", }, { name: "69079", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/69079", }, { name: "61043", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61043", }, { name: "60810", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60810", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=280b1f1ad12131defcd986676a8fc9717aaa601b", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61775", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59756", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127504", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "RHSA-2015:0126", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0126.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58962", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.arubanetworks.com/support/alerts/aid-08182014.txt", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60684", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://techzone.ergon.ch/CVE-2014-3511", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "61139", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61139", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-06T00:00:00", descriptions: [ { lang: "en", value: "The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a \"protocol downgrade\" issue.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-14T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61017", }, { name: "RHSA-2015:0197", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0197.html", }, { name: "60377", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60377", }, { name: "SSRT101818", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "59887", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59887", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "60890", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60890", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60803", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1030693", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "openssl-cve20143511-sec-bypass(95162)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95162", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.splunk.com/view/SP-CAAANHS", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60917", }, { name: "HPSBMU03216", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.tenable.com/security/tns-2014-06", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10084", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60921", }, { name: "69079", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/69079", }, { name: "61043", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61043", }, { name: "60810", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60810", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=280b1f1ad12131defcd986676a8fc9717aaa601b", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61775", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59756", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127504", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "RHSA-2015:0126", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0126.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58962", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.arubanetworks.com/support/alerts/aid-08182014.txt", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60684", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://techzone.ergon.ch/CVE-2014-3511", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "61139", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61139", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3511", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a \"protocol downgrade\" issue.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2014:1052", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1052.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", refsource: "SECUNIA", url: "http://secunia.com/advisories/60221", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "61184", refsource: "SECUNIA", url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", refsource: "SECUNIA", url: "http://secunia.com/advisories/60022", }, { name: "https://www.openssl.org/news/secadv_20140806.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", refsource: "SECUNIA", url: "http://secunia.com/advisories/61017", }, { name: "RHSA-2015:0197", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0197.html", }, { name: "60377", refsource: "SECUNIA", url: "http://secunia.com/advisories/60377", }, { name: "SSRT101818", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "59887", refsource: "SECUNIA", url: "http://secunia.com/advisories/59887", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "HPSBMU03304", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "60890", refsource: "SECUNIA", url: "http://secunia.com/advisories/60890", }, { name: "GLSA-201412-39", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html", }, { name: "HPSBHF03293", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03260", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "60803", refsource: "SECUNIA", url: "http://secunia.com/advisories/60803", }, { name: "59700", refsource: "SECUNIA", url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1030693", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "openssl-cve20143511-sec-bypass(95162)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95162", }, { name: "http://www.splunk.com/view/SP-CAAANHS", refsource: "CONFIRM", url: "http://www.splunk.com/view/SP-CAAANHS", }, { name: "60917", refsource: "SECUNIA", url: "http://secunia.com/advisories/60917", }, { name: "HPSBMU03216", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "http://www.tenable.com/security/tns-2014-06", refsource: "CONFIRM", url: "http://www.tenable.com/security/tns-2014-06", }, { name: "NetBSD-SA2014-008", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10084", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10084", }, { name: "60493", refsource: "SECUNIA", url: "http://secunia.com/advisories/60493", }, { name: "59710", refsource: "SECUNIA", url: "http://secunia.com/advisories/59710", }, { name: "60921", refsource: "SECUNIA", url: "http://secunia.com/advisories/60921", }, { name: "69079", refsource: "BID", url: "http://www.securityfocus.com/bid/69079", }, { name: "61043", refsource: "SECUNIA", url: "http://secunia.com/advisories/61043", }, { name: "60810", refsource: "SECUNIA", url: "http://secunia.com/advisories/60810", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=280b1f1ad12131defcd986676a8fc9717aaa601b", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=280b1f1ad12131defcd986676a8fc9717aaa601b", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", refsource: "SECUNIA", url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", refsource: "FREEBSD", url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", refsource: "SECUNIA", url: "http://secunia.com/advisories/61775", }, { name: "SSRT101894", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "DSA-2998", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "HPSBMU03263", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "61959", refsource: "SECUNIA", url: "http://secunia.com/advisories/61959", }, { name: "59756", refsource: "SECUNIA", url: "http://secunia.com/advisories/59756", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1127504", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127504", }, { name: "HPSBMU03267", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "RHSA-2015:0126", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0126.html", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", refsource: "SECUNIA", url: "http://secunia.com/advisories/58962", }, { name: "http://www.arubanetworks.com/support/alerts/aid-08182014.txt", refsource: "CONFIRM", url: "http://www.arubanetworks.com/support/alerts/aid-08182014.txt", }, { name: "60938", refsource: "SECUNIA", url: "http://secunia.com/advisories/60938", }, { name: "60684", refsource: "SECUNIA", url: "http://secunia.com/advisories/60684", }, { name: "https://support.citrix.com/article/CTX216642", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX216642", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", refsource: "MLIST", url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "https://techzone.ergon.ch/CVE-2014-3511", refsource: "CONFIRM", url: "https://techzone.ergon.ch/CVE-2014-3511", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "61139", refsource: "SECUNIA", url: "http://secunia.com/advisories/61139", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3511", datePublished: "2014-08-13T23:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.344Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3566
Vulnerability from cvelistv5
Published
2014-10-15 00:00
Modified
2024-11-27 19:31
Severity ?
EPSS score ?
Summary
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-11-27T19:31:57.733Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { url: "https://templatelab.com/ssl-poodle/", }, { name: "HPSBOV03227", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", }, { name: "1031090", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031090", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/", }, { name: "RHSA-2014:1880", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1880.html", }, { name: "HPSBHF03300", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635", }, { name: "VU#577193", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/577193", }, { name: "HPSBMU03184", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577087123040&w=2", }, { name: "HPSBGN03209", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141715130023061&w=2", }, { name: "openSUSE-SU-2014:1331", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT6542", }, { name: "1031106", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031106", }, { name: "HPSBGN03201", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141697638231025&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "[openssl-dev] 20141014 Patch to mitigate CVE-2014-3566 (\"POODLE\")", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://marc.info/?l=openssl-dev&m=141333049205629&w=2", }, { name: "SSRT101898", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350298616097&w=2", }, { name: "SSRT101896", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350743917559&w=2", }, { name: "60056", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60056", }, { name: "RHSA-2014:1877", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1877.html", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61130", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61130", }, { name: "RHSA-2015:1546", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1546.html", }, { name: "SUSE-SU-2015:0503", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT6529", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20141015.txt", }, { name: "APPLE-SA-2014-10-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { name: "RHSA-2014:1920", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1920.html", }, { name: "1031087", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031087", }, { name: "HPSBMU03234", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143628269912142&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa83", }, { name: "SSRT101849", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879378918327&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.citrix.com/article/CTX200238", }, { name: "61359", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61359", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT6541", }, { name: "1031093", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031093", }, { name: "1031132", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031132", }, { name: "DSA-3144", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3144", }, { name: "SSRT101790", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721887231400&w=2", }, { name: "DSA-3253", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3253", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.suse.com/support/kb/doc.php?id=7015773", }, { name: "APPLE-SA-2014-10-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/533724/100/0/threaded", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.elastic.co/blog/logstash-1-4-3-released", }, { name: "SSRT101854", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142296755107581&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBST03195", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { name: "61827", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61827", }, { name: "HPSBMU03152", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141450452204552&w=2", }, { name: "RHSA-2015:0079", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0079.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://technet.microsoft.com/library/security/3009008.aspx", }, { name: "RHSA-2015:1545", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1545.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www-01.ibm.com/support/docview.wss?uid=swg21688165", }, { name: "HPSBMU03259", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624619906067&w=2", }, { name: "1031094", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031094", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", }, { name: "61316", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61316", }, { name: "GLSA-201606-11", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201606-11", }, { name: "RHSA-2014:1881", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1881.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.imperialviolet.org/2014/10/14/poodle.html", }, { name: "1031096", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031096", }, { name: "HPSBHF03275", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721887231400&w=2", }, { name: "61810", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61810", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "DSA-3053", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-3053", }, { name: "HPSBGN03237", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142296755107581&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.lenovo.com/us/en/product_security/poodle", }, { name: "1031107", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031107", }, { name: "1031095", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031095", }, { name: "HPSBMU03223", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290583027876&w=2", }, { name: "SUSE-SU-2014:1549", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", }, { name: "HPSBGN03305", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142962817202793&w=2", }, { name: "HPSBUX03194", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143101048219218&w=2", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "1031091", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031091", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "1031123", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031123", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT205217", }, { name: "1031092", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031092", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "SUSE-SU-2015:0376", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", }, { name: "61926", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61926", }, { name: "RHSA-2014:1876", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1876.html", }, { name: "SSRT101779", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html", }, { name: "HPSBHF03156", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141450973807288&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "SSRT101838", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141814011518700&w=2", }, { name: "HPSBGN03569", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=145983526810210&w=2", }, { name: "APPLE-SA-2015-09-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1076983", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT6531", }, { name: "SUSE-SU-2014:1357", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip", }, { name: "RHSA-2015:0264", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0264.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT6527", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "SSRT101897", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350196615714&w=2", }, { name: "HPSBGN03203", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141697676231104&w=2", }, { name: "60206", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60206", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1152789", }, { name: "60792", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60792", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "APPLE-SA-2014-10-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", }, { name: "DSA-3489", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3489", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20141015-0001/", }, { name: "1031105", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031105", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html", }, { name: "FEDORA-2014-13069", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html", }, { name: "1031131", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031131", }, { name: "HPSBMU03221", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879378918327&w=2", }, { name: "USN-2487-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2487-1", }, { name: "SSRT101795", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142740155824959&w=2", }, { name: "HPSBGN03222", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141813976718456&w=2", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html", }, { name: "1031130", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031130", }, { name: "HPSBMU03301", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721830231196&w=2", }, { name: "HPSBGN03164", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577350823734&w=2", }, { name: "RHSA-2014:1948", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1948.html", }, { name: "NetBSD-SA2014-015", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc", }, { name: "HPSBGN03192", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141620103726640&w=2", }, { name: "RHSA-2014:1653", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1653.html", }, { name: "SUSE-SU-2015:0392", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", }, { name: "HPSBMU03416", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144101915224472&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/HT204244", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx", }, { name: "HPSBMU03283", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2", }, { name: "RHSA-2015:0085", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0085.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT6536", }, { name: "FEDORA-2014-12951", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html", }, { name: "HPSBGN03191", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141576815022399&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU", }, { name: "SSRT101767", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "SUSE-SU-2014:1526", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", }, { name: "HPSBGN03332", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290371927178&w=2", }, { name: "RHSA-2014:1652", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1652.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT6535", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02", }, { name: "SUSE-SU-2015:0345", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", }, { name: "HPSBST03265", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142546741516006&w=2", }, { name: "RHSA-2015:0086", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0086.html", }, { name: "HPSBMU03241", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143039249603103&w=2", }, { name: "1031124", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031124", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "SUSE-SU-2015:0336", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", }, { name: "RHSA-2015:0080", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0080.html", }, { name: "HPSBMU03294", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142740155824959&w=2", }, { name: "RHSA-2014:1882", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1882.html", }, { name: "RHSA-2015:0068", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0068.html", }, { name: "HPSBGN03251", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142354438527235&w=2", }, { name: "USN-2486-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2486-1", }, { name: "HPSBGN03391", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144294141001552&w=2", }, { name: "59627", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59627", }, { name: "HPSBGN03208", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141814011518700&w=2", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "HPSBMU03214", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141694355519663&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "HPSBGN03254", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350298616097&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.lenovo.com/product_security/poodle", }, { name: "20141014 SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle", }, { name: "HPSBGN03205", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141775427104070&w=2", }, { name: "RHSA-2015:0698", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0698.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "SUSE-SU-2014:1361", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://downloads.asterisk.org/pub/security/AST-2014-011.html", }, { name: "60859", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60859", }, { name: "APPLE-SA-2014-10-20-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/533746", }, { name: "GLSA-201507-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201507-14", }, { name: "SSRT101921", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2", }, { name: "SSRT101951", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496355704097&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm", }, { name: "61345", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61345", }, { name: "SSRT101834", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143101048219218&w=2", }, { name: "61019", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61019", }, { name: "70574", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/70574", }, { name: "1031120", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031120", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", }, { name: "61825", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61825", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2014-0416.html", }, { name: "1031029", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031029", }, { name: "HPSBUX03281", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", }, { name: "HPSBMU03262", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "SUSE-SU-2016:1459", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10104", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", }, { name: "61782", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61782", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://access.redhat.com/articles/1232123", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "FEDORA-2015-9110", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html", }, { name: "1031085", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031085", }, { name: "HPSBST03418", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144251162130364&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "SSRT101892", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143039249603103&w=2", }, { name: "APPLE-SA-2014-10-20-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/533747", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101916", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687611", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mpgn/poodle-PoC", }, { name: "MDVSA-2014:203", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:203", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101968", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142607790919348&w=2", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "SSRT101899", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142354438527235&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://puppet.com/security/cve/poodle-sslv3-vulnerability", }, { name: "openSUSE-SU-2015:0190", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "61303", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61303", }, { name: "HPSBGN03252", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350743917559&w=2", }, { name: "HPSBUX03273", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496355704097&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21692299", }, { name: "1031039", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031039", }, { name: "SUSE-SU-2016:1457", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687172", }, { name: "SSRT101998", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721830231196&w=2", }, { name: "SUSE-SU-2015:0344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", }, { name: "SSRT101922", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624619906067", }, { name: "1031089", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031089", }, { name: "HPSBGN03253", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350196615714&w=2", }, { name: "HPSBMU03183", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141628688425177&w=2", }, { name: "TA14-290A", tags: [ "third-party-advisory", "x_refsource_CERT", "x_transferred", ], url: "http://www.us-cert.gov/ncas/alerts/TA14-290A", }, { name: "FEDORA-2014-13012", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html", }, { name: "61819", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61819", }, { name: "HPSBGN03255", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142357976805598&w=2", }, { name: "1031088", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031088", }, { name: "DSA-3147", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3147", }, { name: "61995", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61995", }, { name: "HPSBGN03202", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141703183219781&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10090", }, { name: "SSRT101928", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142357976805598&w=2", }, { name: "1031086", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031086", }, { name: "HPSBPI03360", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143558192010071&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", }, { name: "RHSA-2014:1692", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1692.html", }, { name: "FEDORA-2015-9090", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.openssl.org/~bodo/ssl-poodle.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439", }, { name: "HPSBPI03107", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143558137709884&w=2", }, { name: "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E", }, { name: "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E", }, { name: "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E", }, { name: "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E", }, { name: "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E", }, { name: "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7", }, ], title: "CVE Program Container", x_generator: { engine: "ADPogram 0.0.1", }, }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-10-14T00:00:00", descriptions: [ { lang: "en", value: "The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the \"POODLE\" issue.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-05T16:29:26", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "HPSBOV03227", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", }, { name: "1031090", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031090", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/", }, { name: "RHSA-2014:1880", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1880.html", }, { name: "HPSBHF03300", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635", }, { name: "VU#577193", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/577193", }, { name: "HPSBMU03184", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577087123040&w=2", }, { name: "HPSBGN03209", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141715130023061&w=2", }, { name: "openSUSE-SU-2014:1331", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT6542", }, { name: "1031106", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031106", }, { name: "HPSBGN03201", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141697638231025&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "[openssl-dev] 20141014 Patch to mitigate CVE-2014-3566 (\"POODLE\")", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://marc.info/?l=openssl-dev&m=141333049205629&w=2", }, { name: "SSRT101898", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350298616097&w=2", }, { name: "SSRT101896", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350743917559&w=2", }, { name: "60056", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60056", }, { name: "RHSA-2014:1877", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1877.html", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61130", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61130", }, { name: "RHSA-2015:1546", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1546.html", }, { name: "SUSE-SU-2015:0503", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT6529", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20141015.txt", }, { name: "APPLE-SA-2014-10-16-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { name: "RHSA-2014:1920", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1920.html", }, { name: "1031087", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031087", }, { name: "HPSBMU03234", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143628269912142&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa83", }, { name: "SSRT101849", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879378918327&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.citrix.com/article/CTX200238", }, { name: "61359", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61359", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT6541", }, { name: "1031093", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031093", }, { name: "1031132", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031132", }, { name: "DSA-3144", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3144", }, { name: "SSRT101790", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721887231400&w=2", }, { name: "DSA-3253", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3253", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.suse.com/support/kb/doc.php?id=7015773", }, { name: "APPLE-SA-2014-10-16-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://www.securityfocus.com/archive/1/533724/100/0/threaded", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.elastic.co/blog/logstash-1-4-3-released", }, { name: "SSRT101854", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142296755107581&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_MISC", ], url: "http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBST03195", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { name: "61827", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61827", }, { name: "HPSBMU03152", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141450452204552&w=2", }, { name: "RHSA-2015:0079", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0079.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://technet.microsoft.com/library/security/3009008.aspx", }, { name: "RHSA-2015:1545", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1545.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www-01.ibm.com/support/docview.wss?uid=swg21688165", }, { name: "HPSBMU03259", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624619906067&w=2", }, { name: "1031094", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031094", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", }, { name: "61316", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61316", }, { name: "GLSA-201606-11", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201606-11", }, { name: "RHSA-2014:1881", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1881.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.imperialviolet.org/2014/10/14/poodle.html", }, { name: "1031096", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031096", }, { name: "HPSBHF03275", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721887231400&w=2", }, { name: "61810", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61810", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "DSA-3053", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-3053", }, { name: "HPSBGN03237", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142296755107581&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.lenovo.com/us/en/product_security/poodle", }, { name: "1031107", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031107", }, { name: "1031095", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031095", }, { name: "HPSBMU03223", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290583027876&w=2", }, { name: "SUSE-SU-2014:1549", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", }, { name: "HPSBGN03305", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142962817202793&w=2", }, { name: "HPSBUX03194", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143101048219218&w=2", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "1031091", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031091", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "1031123", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031123", }, { tags: [ "x_refsource_MISC", ], url: "http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT205217", }, { name: "1031092", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031092", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "SUSE-SU-2015:0376", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", }, { name: "61926", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61926", }, { name: "RHSA-2014:1876", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1876.html", }, { name: "SSRT101779", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html", }, { name: "HPSBHF03156", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141450973807288&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "SSRT101838", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141814011518700&w=2", }, { name: "HPSBGN03569", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=145983526810210&w=2", }, { name: "APPLE-SA-2015-09-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1076983", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT6531", }, { name: "SUSE-SU-2014:1357", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip", }, { name: "RHSA-2015:0264", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0264.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT6527", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "SSRT101897", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350196615714&w=2", }, { name: "HPSBGN03203", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141697676231104&w=2", }, { name: "60206", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60206", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1152789", }, { name: "60792", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60792", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "APPLE-SA-2014-10-16-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", }, { name: "DSA-3489", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3489", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20141015-0001/", }, { name: "1031105", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031105", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html", }, { name: "FEDORA-2014-13069", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html", }, { name: "1031131", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031131", }, { name: "HPSBMU03221", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879378918327&w=2", }, { name: "USN-2487-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2487-1", }, { name: "SSRT101795", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142740155824959&w=2", }, { name: "HPSBGN03222", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141813976718456&w=2", }, { tags: [ "x_refsource_MISC", ], url: "https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html", }, { name: "1031130", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031130", }, { name: "HPSBMU03301", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721830231196&w=2", }, { name: "HPSBGN03164", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577350823734&w=2", }, { name: "RHSA-2014:1948", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1948.html", }, { name: "NetBSD-SA2014-015", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc", }, { name: "HPSBGN03192", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141620103726640&w=2", }, { name: "RHSA-2014:1653", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1653.html", }, { name: "SUSE-SU-2015:0392", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", }, { name: "HPSBMU03416", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144101915224472&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/HT204244", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx", }, { name: "HPSBMU03283", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2", }, { name: "RHSA-2015:0085", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0085.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT6536", }, { name: "FEDORA-2014-12951", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html", }, { name: "HPSBGN03191", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141576815022399&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU", }, { name: "SSRT101767", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "SUSE-SU-2014:1526", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", }, { name: "HPSBGN03332", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290371927178&w=2", }, { name: "RHSA-2014:1652", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1652.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT6535", }, { tags: [ "x_refsource_MISC", ], url: "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02", }, { name: "SUSE-SU-2015:0345", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", }, { name: "HPSBST03265", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142546741516006&w=2", }, { name: "RHSA-2015:0086", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0086.html", }, { name: "HPSBMU03241", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143039249603103&w=2", }, { name: "1031124", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031124", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "SUSE-SU-2015:0336", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", }, { name: "RHSA-2015:0080", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0080.html", }, { name: "HPSBMU03294", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142740155824959&w=2", }, { name: "RHSA-2014:1882", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1882.html", }, { name: "RHSA-2015:0068", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0068.html", }, { name: "HPSBGN03251", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142354438527235&w=2", }, { name: "USN-2486-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2486-1", }, { name: "HPSBGN03391", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144294141001552&w=2", }, { name: "59627", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59627", }, { name: "HPSBGN03208", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141814011518700&w=2", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "HPSBMU03214", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141694355519663&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "HPSBGN03254", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350298616097&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.lenovo.com/product_security/poodle", }, { name: "20141014 SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle", }, { name: "HPSBGN03205", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141775427104070&w=2", }, { name: "RHSA-2015:0698", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0698.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "SUSE-SU-2014:1361", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://downloads.asterisk.org/pub/security/AST-2014-011.html", }, { name: "60859", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60859", }, { name: "APPLE-SA-2014-10-20-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://www.securityfocus.com/archive/1/533746", }, { name: "GLSA-201507-14", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201507-14", }, { name: "SSRT101921", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2", }, { name: "SSRT101951", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496355704097&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm", }, { name: "61345", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61345", }, { name: "SSRT101834", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143101048219218&w=2", }, { name: "61019", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61019", }, { name: "70574", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/70574", }, { name: "1031120", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031120", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", }, { name: "61825", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61825", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2014-0416.html", }, { name: "1031029", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031029", }, { name: "HPSBUX03281", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", }, { name: "HPSBMU03262", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624719706349&w=2", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "SUSE-SU-2016:1459", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10104", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", }, { name: "61782", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61782", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://access.redhat.com/articles/1232123", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "FEDORA-2015-9110", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html", }, { name: "1031085", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031085", }, { name: "HPSBST03418", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144251162130364&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "SSRT101892", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143039249603103&w=2", }, { name: "APPLE-SA-2014-10-20-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://www.securityfocus.com/archive/1/533747", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101916", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624679706236&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687611", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mpgn/poodle-PoC", }, { name: "MDVSA-2014:203", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:203", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101968", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142607790919348&w=2", }, { tags: [ "x_refsource_MISC", ], url: "http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "SSRT101899", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142354438527235&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://puppet.com/security/cve/poodle-sslv3-vulnerability", }, { name: "openSUSE-SU-2015:0190", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "61303", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61303", }, { name: "HPSBGN03252", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350743917559&w=2", }, { name: "HPSBUX03273", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496355704097&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21692299", }, { name: "1031039", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031039", }, { name: "SUSE-SU-2016:1457", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687172", }, { name: "SSRT101998", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721830231196&w=2", }, { name: "SUSE-SU-2015:0344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", }, { name: "SSRT101922", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624619906067", }, { name: "1031089", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031089", }, { name: "HPSBGN03253", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350196615714&w=2", }, { name: "HPSBMU03183", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141628688425177&w=2", }, { name: "TA14-290A", tags: [ "third-party-advisory", "x_refsource_CERT", ], url: "http://www.us-cert.gov/ncas/alerts/TA14-290A", }, { name: "FEDORA-2014-13012", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html", }, { name: "61819", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61819", }, { name: "HPSBGN03255", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142357976805598&w=2", }, { name: "1031088", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031088", }, { name: "DSA-3147", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3147", }, { name: "61995", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61995", }, { name: "HPSBGN03202", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141703183219781&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10090", }, { name: "SSRT101928", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142357976805598&w=2", }, { name: "1031086", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031086", }, { name: "HPSBPI03360", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143558192010071&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", }, { name: "RHSA-2014:1692", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1692.html", }, { name: "FEDORA-2015-9090", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.openssl.org/~bodo/ssl-poodle.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439", }, { name: "HPSBPI03107", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143558137709884&w=2", }, { name: "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E", }, { name: "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E", }, { name: "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E", }, { name: "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E", }, { name: "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E", }, { name: "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3566", datePublished: "2014-10-15T00:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-11-27T19:31:57.733Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-0224
Vulnerability from cvelistv5
Published
2014-06-05 21:00
Modified
2024-08-06 09:05
Severity ?
EPSS score ?
Summary
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T09:05:39.462Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59669", }, { name: "59525", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59525", }, { name: "HPSBMU03071", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140604261522465&w=2", }, { name: "59004", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59004", }, { name: "59530", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59530", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", }, { name: "59824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59824", }, { name: "59282", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59282", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015300", }, { name: "59215", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59215", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", }, { name: "59990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59990", }, { name: "59264", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59264", }, { name: "59454", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59454", }, { name: "58492", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58492", }, { name: "59186", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59186", }, { name: "59188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59188", }, { name: "59126", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59126", }, { name: "HPSBMU03078", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140672208601650&w=2", }, { name: "HPSBMU03089", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140784085708882&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015264", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", }, { name: "59306", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59306", }, { name: "RHSA-2014:0627", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0627.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { name: "HPSBGN03068", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2", }, { name: "RHSA-2014:0626", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0626.html", }, { name: "59190", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59190", }, { name: "58639", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58639", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676877", }, { name: "59446", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59446", }, { name: "59529", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59529", }, { name: "59445", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59445", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "59589", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59589", }, { name: "59894", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59894", }, { name: "59325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59325", }, { name: "59354", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59354", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", }, { name: "HPSBUX03046", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "61254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61254", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", }, { name: "59447", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59447", }, { name: "1031594", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031594", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", }, { name: "59223", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59223", }, { name: "58743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58743", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "58719", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58719", }, { name: "59449", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59449", }, { name: "59132", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59132", }, { name: "SSRT101818", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "HPSBST03098", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140870499402361&w=2", }, { name: "HPSBMU03058", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140386311427810&w=2", }, { name: "59442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59442", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { name: "HPSBST03195", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", }, { name: "HPSBMU03094", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140852757108392&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://filezilla-project.org/versions.php?type=server", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", }, { name: "60567", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60567", }, { name: "59189", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59189", }, { name: "59368", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59368", }, { name: "MDVSA-2014:106", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "59142", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59142", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", }, { name: "58742", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58742", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", }, { name: "RHSA-2014:0624", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0624.html", }, { name: "59602", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59602", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.kerio.com/support/kerio-control/release-history", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59300", }, { name: "58930", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58930", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", }, { name: "61815", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61815", }, { name: "58667", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58667", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", }, { name: "59191", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59191", }, { name: "59284", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59284", }, { name: "59444", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59444", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.imperialviolet.org/2014/06/05/earlyccs.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59365", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "59305", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59305", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "59483", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59483", }, { name: "58385", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58385", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "59495", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59495", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58945", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "HPSBST03106", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141025641601169&w=2", }, { name: "59659", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59659", }, { name: "59440", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59440", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "59429", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59429", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59655", }, { name: "59370", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59370", }, { name: "59827", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59827", }, { name: "58660", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58660", }, { name: "59163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59163", }, { name: "58716", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58716", }, { name: "59055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59055", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "60176", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60176", }, { name: "HPSBPI03107", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141147110427269&w=2", }, { name: "59101", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59101", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", }, { name: "59374", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59374", }, { name: "59063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59063", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://discussions.nessus.org/thread/7517", }, { name: "59310", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59310", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", }, { name: "HPSBMU03216", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { name: "IV61506", tags: [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506", }, { name: "59502", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59502", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAM2D", }, { name: "59878", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59878", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { name: "HPSBMU03101", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140852826008699&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { name: "59214", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59214", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBHF03088", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140794476212181&w=2", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.citrix.com/article/CTX140876", }, { name: "59167", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59167", }, { name: "59120", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59120", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", }, { name: "HPSBMU03053", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140369637402535&w=2", }, { name: "59380", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59380", }, { name: "MDVSA-2014:105", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105", }, { name: "59460", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59460", }, { name: "59506", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59506", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59661", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59661", }, { name: "59514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59514", }, { name: "59677", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59677", }, { name: "RHSA-2014:0630", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0630.html", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { name: "RHSA-2014:0632", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0632.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", }, { name: "58745", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58745", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59438", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", }, { name: "58714", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { name: "openSUSE-SU-2015:0229", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://ccsinjection.lepidum.co.jp", }, { name: "59435", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59435", }, { name: "HPSBHF03052", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58615", }, { name: "HPSBST03265", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142546741516006&w=2", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", }, { name: "59231", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59231", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT6443", }, { name: "59211", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59211", }, { name: "58433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58433", }, { name: "60066", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60066", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://access.redhat.com/site/blogs/766093/posts/908133", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59301", }, { name: "60522", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60522", }, { name: "59784", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59784", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBST03097", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383410222440&w=2", }, { name: "20140607 Re: More OpenSSL issues", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Jun/38", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", }, { name: "59135", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59135", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "58759", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58759", }, { name: "59093", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59093", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://puppetlabs.com/security/cve/cve-2014-0224", }, { name: "59192", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "58579", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58579", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", }, { name: "59040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59040", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59175", }, { name: "60819", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60819", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59666", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", }, { name: "58128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58128", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59413", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59721", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { name: "RHSA-2014:0680", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0680.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "59012", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59012", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "59362", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59362", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "HPSBMU03070", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140499864129699&w=2", }, { name: "RHSA-2014:0631", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0631.html", }, { name: "59338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59338", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59450", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "VU#978508", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/978508", }, { name: "1031032", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031032", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59491", }, { name: "59364", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59364", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", }, { name: "59451", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59451", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58977", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", }, { name: "60571", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60571", }, { name: "59459", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59459", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", }, { name: "60577", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60577", }, { name: "59448", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59448", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.blackberry.com/btsc/KB36051", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { name: "HPSBST03103", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141164638606214&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", }, { name: "59885", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59885", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "59202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59202", }, { name: "RHSA-2014:0633", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0633.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", }, { name: "59375", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59375", }, { name: "HPSBMU03083", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140983229106599&w=2", }, { name: "59528", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59528", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58337", }, { name: "59518", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59518", }, { name: "59389", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59389", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59162", }, { name: "59383", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59383", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59490", }, { name: "59916", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59916", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", }, { name: "HPSBMU03065", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", }, { name: "IT02314", tags: [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg1IT02314", }, { name: "59043", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59043", }, { name: "59347", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59347", }, { name: "60049", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60049", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-06-05T00:00:00", descriptions: [ { lang: "en", value: "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-05T16:47:29", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59669", }, { name: "59525", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59525", }, { name: "HPSBMU03071", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140604261522465&w=2", }, { name: "59004", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59004", }, { name: "59530", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59530", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", }, { name: "59824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59824", }, { name: "59282", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59282", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015300", }, { name: "59215", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59215", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", }, { name: "59990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59990", }, { name: "59264", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59264", }, { name: "59454", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59454", }, { name: "58492", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58492", }, { name: "59186", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59186", }, { name: "59188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59188", }, { name: "59126", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59126", }, { name: "HPSBMU03078", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140672208601650&w=2", }, { name: "HPSBMU03089", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140784085708882&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015264", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", }, { name: "59306", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59306", }, { name: "RHSA-2014:0627", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0627.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { name: "HPSBGN03068", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2", }, { name: "RHSA-2014:0626", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0626.html", }, { name: "59190", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59190", }, { name: "58639", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58639", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676877", }, { name: "59446", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59446", }, { name: "59529", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59529", }, { name: "59445", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59445", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "59589", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59589", }, { name: "59894", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59894", }, { name: "59325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59325", }, { name: "59354", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59354", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", }, { name: "HPSBUX03046", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "61254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61254", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", }, { name: "59447", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59447", }, { name: "1031594", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031594", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", }, { name: "59223", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59223", }, { name: "58743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58743", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "58719", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58719", }, { name: "59449", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59449", }, { name: "59132", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59132", }, { name: "SSRT101818", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "HPSBST03098", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140870499402361&w=2", }, { name: "HPSBMU03058", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140386311427810&w=2", }, { name: "59442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59442", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { name: "HPSBST03195", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", }, { name: "HPSBMU03094", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140852757108392&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://filezilla-project.org/versions.php?type=server", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", }, { name: "60567", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60567", }, { name: "59189", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59189", }, { name: "59368", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59368", }, { name: "MDVSA-2014:106", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "59142", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59142", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", }, { name: "58742", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58742", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", }, { name: "RHSA-2014:0624", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0624.html", }, { name: "59602", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59602", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.kerio.com/support/kerio-control/release-history", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59300", }, { name: "58930", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58930", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", }, { name: "61815", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61815", }, { name: "58667", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58667", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", }, { name: "59191", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59191", }, { name: "59284", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59284", }, { name: "59444", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59444", }, { tags: [ "x_refsource_MISC", ], url: "https://www.imperialviolet.org/2014/06/05/earlyccs.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59365", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "59305", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59305", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "59483", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59483", }, { name: "58385", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58385", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "59495", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59495", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58945", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "HPSBST03106", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141025641601169&w=2", }, { name: "59659", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59659", }, { name: "59440", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59440", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "59429", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59429", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59655", }, { name: "59370", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59370", }, { name: "59827", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59827", }, { name: "58660", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58660", }, { name: "59163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59163", }, { name: "58716", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58716", }, { name: "59055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59055", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "60176", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60176", }, { name: "HPSBPI03107", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141147110427269&w=2", }, { name: "59101", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59101", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", }, { name: "59374", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59374", }, { name: "59063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59063", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://discussions.nessus.org/thread/7517", }, { name: "59310", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59310", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", }, { name: "HPSBMU03216", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { name: "IV61506", tags: [ "vendor-advisory", "x_refsource_AIXAPAR", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506", }, { name: "59502", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59502", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.splunk.com/view/SP-CAAAM2D", }, { name: "59878", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59878", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { name: "HPSBMU03101", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140852826008699&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { name: "59214", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59214", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBHF03088", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140794476212181&w=2", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.citrix.com/article/CTX140876", }, { name: "59167", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59167", }, { name: "59120", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59120", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", }, { name: "HPSBMU03053", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140369637402535&w=2", }, { name: "59380", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59380", }, { name: "MDVSA-2014:105", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105", }, { name: "59460", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59460", }, { name: "59506", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59506", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59661", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59661", }, { name: "59514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59514", }, { name: "59677", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59677", }, { name: "RHSA-2014:0630", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0630.html", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { name: "RHSA-2014:0632", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0632.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", }, { name: "58745", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58745", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59438", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", }, { name: "58714", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { name: "openSUSE-SU-2015:0229", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", }, { tags: [ "x_refsource_MISC", ], url: "http://ccsinjection.lepidum.co.jp", }, { name: "59435", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59435", }, { name: "HPSBHF03052", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58615", }, { name: "HPSBST03265", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142546741516006&w=2", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", }, { name: "59231", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59231", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT6443", }, { name: "59211", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59211", }, { name: "58433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58433", }, { name: "60066", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60066", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://access.redhat.com/site/blogs/766093/posts/908133", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59301", }, { name: "60522", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60522", }, { name: "59784", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59784", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBST03097", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383410222440&w=2", }, { name: "20140607 Re: More OpenSSL issues", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Jun/38", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", }, { name: "59135", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59135", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "58759", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58759", }, { name: "59093", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59093", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://puppetlabs.com/security/cve/cve-2014-0224", }, { name: "59192", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "58579", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58579", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", }, { name: "59040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59040", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59175", }, { name: "60819", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60819", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59666", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", }, { name: "58128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58128", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59413", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59721", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { name: "RHSA-2014:0680", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0680.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "59012", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59012", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "59362", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59362", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "HPSBMU03070", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140499864129699&w=2", }, { name: "RHSA-2014:0631", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0631.html", }, { name: "59338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59338", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59450", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "VU#978508", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/978508", }, { name: "1031032", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031032", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59491", }, { name: "59364", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59364", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", }, { name: "59451", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59451", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58977", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", }, { name: "60571", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60571", }, { name: "59459", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59459", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", }, { name: "60577", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60577", }, { name: "59448", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59448", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.blackberry.com/btsc/KB36051", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { name: "HPSBST03103", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141164638606214&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", }, { name: "59885", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59885", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "59202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59202", }, { name: "RHSA-2014:0633", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0633.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", }, { name: "59375", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59375", }, { name: "HPSBMU03083", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140983229106599&w=2", }, { name: "59528", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59528", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58337", }, { name: "59518", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59518", }, { name: "59389", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59389", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59162", }, { name: "59383", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59383", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59490", }, { name: "59916", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59916", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", }, { name: "HPSBMU03065", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", }, { name: "IT02314", tags: [ "vendor-advisory", "x_refsource_AIXAPAR", ], url: "http://www.ibm.com/support/docview.wss?uid=swg1IT02314", }, { name: "59043", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59043", }, { name: "59347", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59347", }, { name: "60049", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60049", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-0224", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "59342", refsource: "SECUNIA", url: "http://secunia.com/advisories/59342", }, { name: "59669", refsource: "SECUNIA", url: "http://secunia.com/advisories/59669", }, { name: "59525", refsource: "SECUNIA", url: "http://secunia.com/advisories/59525", }, { name: "HPSBMU03071", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140604261522465&w=2", }, { name: "59004", refsource: "SECUNIA", url: "http://secunia.com/advisories/59004", }, { name: "59530", refsource: "SECUNIA", url: "http://secunia.com/advisories/59530", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", }, { name: "59824", refsource: "SECUNIA", url: "http://secunia.com/advisories/59824", }, { name: "59282", refsource: "SECUNIA", url: "http://secunia.com/advisories/59282", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015300", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015300", }, { name: "59215", refsource: "SECUNIA", url: "http://secunia.com/advisories/59215", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", }, { name: "59990", refsource: "SECUNIA", url: "http://secunia.com/advisories/59990", }, { name: "59264", refsource: "SECUNIA", url: "http://secunia.com/advisories/59264", }, { name: "59454", refsource: "SECUNIA", url: "http://secunia.com/advisories/59454", }, { name: "58492", refsource: "SECUNIA", url: "http://secunia.com/advisories/58492", }, { name: "59186", refsource: "SECUNIA", url: "http://secunia.com/advisories/59186", }, { name: "59188", refsource: "SECUNIA", url: "http://secunia.com/advisories/59188", }, { name: "59126", refsource: "SECUNIA", url: "http://secunia.com/advisories/59126", }, { name: "HPSBMU03078", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140672208601650&w=2", }, { name: "HPSBMU03089", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140784085708882&w=2", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015264", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015264", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", }, { name: "59306", refsource: "SECUNIA", url: "http://secunia.com/advisories/59306", }, { name: "RHSA-2014:0627", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0627.html", }, { name: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", refsource: "CONFIRM", url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { name: "HPSBGN03068", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2", }, { name: "RHSA-2014:0626", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0626.html", }, { name: "59190", refsource: "SECUNIA", url: "http://secunia.com/advisories/59190", }, { name: "58639", refsource: "SECUNIA", url: "http://secunia.com/advisories/58639", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676877", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676877", }, { name: "59446", refsource: "SECUNIA", url: "http://secunia.com/advisories/59446", }, { name: "59529", refsource: "SECUNIA", url: "http://secunia.com/advisories/59529", }, { name: "59445", refsource: "SECUNIA", url: "http://secunia.com/advisories/59445", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "59589", refsource: "SECUNIA", url: "http://secunia.com/advisories/59589", }, { name: "59894", refsource: "SECUNIA", url: "http://secunia.com/advisories/59894", }, { name: "59325", refsource: "SECUNIA", url: "http://secunia.com/advisories/59325", }, { name: "59354", refsource: "SECUNIA", url: "http://secunia.com/advisories/59354", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", }, { name: "HPSBUX03046", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "61254", refsource: "SECUNIA", url: "http://secunia.com/advisories/61254", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", }, { name: "59447", refsource: "SECUNIA", url: "http://secunia.com/advisories/59447", }, { name: "1031594", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1031594", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { name: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", refsource: "CONFIRM", url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", }, { name: "59223", refsource: "SECUNIA", url: "http://secunia.com/advisories/59223", }, { name: "58743", refsource: "SECUNIA", url: "http://secunia.com/advisories/58743", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "58719", refsource: "SECUNIA", url: "http://secunia.com/advisories/58719", }, { name: "59449", refsource: "SECUNIA", url: "http://secunia.com/advisories/59449", }, { name: "59132", refsource: "SECUNIA", url: "http://secunia.com/advisories/59132", }, { name: "SSRT101818", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "HPSBST03098", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140870499402361&w=2", }, { name: "HPSBMU03058", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140386311427810&w=2", }, { name: "59442", refsource: "SECUNIA", url: "http://secunia.com/advisories/59442", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { name: "HPSBST03195", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", refsource: "SECUNIA", url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", refsource: "CONFIRM", url: "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", }, { name: "HPSBMU03094", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140852757108392&w=2", }, { name: "https://filezilla-project.org/versions.php?type=server", refsource: "CONFIRM", url: "https://filezilla-project.org/versions.php?type=server", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", }, { name: "60567", refsource: "SECUNIA", url: "http://secunia.com/advisories/60567", }, { name: "59189", refsource: "SECUNIA", url: "http://secunia.com/advisories/59189", }, { name: "59368", refsource: "SECUNIA", url: "http://secunia.com/advisories/59368", }, { name: "MDVSA-2014:106", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "59142", refsource: "SECUNIA", url: "http://secunia.com/advisories/59142", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", }, { name: "58742", refsource: "SECUNIA", url: "http://secunia.com/advisories/58742", }, { name: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", refsource: "CONFIRM", url: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", }, { name: "RHSA-2014:0624", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0624.html", }, { name: "59602", refsource: "SECUNIA", url: "http://secunia.com/advisories/59602", }, { name: "http://www.kerio.com/support/kerio-control/release-history", refsource: "CONFIRM", url: "http://www.kerio.com/support/kerio-control/release-history", }, { name: "59300", refsource: "SECUNIA", url: "http://secunia.com/advisories/59300", }, { name: "58930", refsource: "SECUNIA", url: "http://secunia.com/advisories/58930", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", }, { name: "61815", refsource: "SECUNIA", url: "http://secunia.com/advisories/61815", }, { name: "58667", refsource: "SECUNIA", url: "http://secunia.com/advisories/58667", }, { name: "GLSA-201407-05", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", }, { name: "59191", refsource: "SECUNIA", url: "http://secunia.com/advisories/59191", }, { name: "59284", refsource: "SECUNIA", url: "http://secunia.com/advisories/59284", }, { name: "59444", refsource: "SECUNIA", url: "http://secunia.com/advisories/59444", }, { name: "https://www.imperialviolet.org/2014/06/05/earlyccs.html", refsource: "MISC", url: "https://www.imperialviolet.org/2014/06/05/earlyccs.html", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg24037783", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", refsource: "SECUNIA", url: "http://secunia.com/advisories/59365", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "59305", refsource: "SECUNIA", url: "http://secunia.com/advisories/59305", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "59483", refsource: "SECUNIA", url: "http://secunia.com/advisories/59483", }, { name: "58385", refsource: "SECUNIA", url: "http://secunia.com/advisories/58385", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "59495", refsource: "SECUNIA", url: "http://secunia.com/advisories/59495", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", refsource: "SECUNIA", url: "http://secunia.com/advisories/58945", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "HPSBST03106", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141025641601169&w=2", }, { name: "59659", refsource: "SECUNIA", url: "http://secunia.com/advisories/59659", }, { name: "59440", refsource: "SECUNIA", url: "http://secunia.com/advisories/59440", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "59429", refsource: "SECUNIA", url: "http://secunia.com/advisories/59429", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", refsource: "SECUNIA", url: "http://secunia.com/advisories/59655", }, { name: "59370", refsource: "SECUNIA", url: "http://secunia.com/advisories/59370", }, { name: "59827", refsource: "SECUNIA", url: "http://secunia.com/advisories/59827", }, { name: "58660", refsource: "SECUNIA", url: "http://secunia.com/advisories/58660", }, { name: "59163", refsource: "SECUNIA", url: "http://secunia.com/advisories/59163", }, { name: "58716", refsource: "SECUNIA", url: "http://secunia.com/advisories/58716", }, { name: "59055", refsource: "SECUNIA", url: "http://secunia.com/advisories/59055", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", refsource: "SECUNIA", url: "http://secunia.com/advisories/59437", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "60176", refsource: "SECUNIA", url: "http://secunia.com/advisories/60176", }, { name: "HPSBPI03107", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141147110427269&w=2", }, { name: "59101", refsource: "SECUNIA", url: "http://secunia.com/advisories/59101", }, { name: "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", refsource: "CONFIRM", url: "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", }, { name: "59374", refsource: "SECUNIA", url: "http://secunia.com/advisories/59374", }, { name: "59063", refsource: "SECUNIA", url: "http://secunia.com/advisories/59063", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "https://discussions.nessus.org/thread/7517", refsource: "CONFIRM", url: "https://discussions.nessus.org/thread/7517", }, { name: "59310", refsource: "SECUNIA", url: "http://secunia.com/advisories/59310", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", }, { name: "HPSBMU03216", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { name: "IV61506", refsource: "AIXAPAR", url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506", }, { name: "59502", refsource: "SECUNIA", url: "http://secunia.com/advisories/59502", }, { name: "http://www.splunk.com/view/SP-CAAAM2D", refsource: "CONFIRM", url: "http://www.splunk.com/view/SP-CAAAM2D", }, { name: "59878", refsource: "SECUNIA", url: "http://secunia.com/advisories/59878", }, { name: "http://www.fortiguard.com/advisory/FG-IR-14-018/", refsource: "CONFIRM", url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { name: "HPSBMU03101", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140852826008699&w=2", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676793", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { name: "59214", refsource: "SECUNIA", url: "http://secunia.com/advisories/59214", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676356", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBHF03088", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140794476212181&w=2", }, { name: "HPSBMU03057", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { name: "http://support.citrix.com/article/CTX140876", refsource: "CONFIRM", url: "http://support.citrix.com/article/CTX140876", }, { name: "59167", refsource: "SECUNIA", url: "http://secunia.com/advisories/59167", }, { name: "59120", refsource: "SECUNIA", url: "http://secunia.com/advisories/59120", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", }, { name: "HPSBMU03053", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140369637402535&w=2", }, { name: "59380", refsource: "SECUNIA", url: "http://secunia.com/advisories/59380", }, { name: "MDVSA-2014:105", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105", }, { name: "59460", refsource: "SECUNIA", url: "http://secunia.com/advisories/59460", }, { name: "59506", refsource: "SECUNIA", url: "http://secunia.com/advisories/59506", }, { name: "58939", refsource: "SECUNIA", url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59661", refsource: "SECUNIA", url: "http://secunia.com/advisories/59661", }, { name: "59514", refsource: "SECUNIA", url: "http://secunia.com/advisories/59514", }, { name: "59677", refsource: "SECUNIA", url: "http://secunia.com/advisories/59677", }, { name: "RHSA-2014:0630", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0630.html", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { name: "RHSA-2014:0632", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0632.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", }, { name: "58745", refsource: "SECUNIA", url: "http://secunia.com/advisories/58745", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", refsource: "SECUNIA", url: "http://secunia.com/advisories/59438", }, { name: "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", }, { name: "58714", refsource: "SECUNIA", url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { name: "openSUSE-SU-2015:0229", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", }, { name: "http://ccsinjection.lepidum.co.jp", refsource: "MISC", url: "http://ccsinjection.lepidum.co.jp", }, { name: "59435", refsource: "SECUNIA", url: "http://secunia.com/advisories/59435", }, { name: "HPSBHF03052", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2", }, { name: "http://www.openssl.org/news/secadv_20140605.txt", refsource: "CONFIRM", url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", refsource: "SECUNIA", url: "http://secunia.com/advisories/58615", }, { name: "HPSBST03265", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142546741516006&w=2", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", }, { name: "59231", refsource: "SECUNIA", url: "http://secunia.com/advisories/59231", }, { name: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", refsource: "CONFIRM", url: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", }, { name: "SUSE-SU-2015:0578", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "http://support.apple.com/kb/HT6443", refsource: "CONFIRM", url: "http://support.apple.com/kb/HT6443", }, { name: "59211", refsource: "SECUNIA", url: "http://secunia.com/advisories/59211", }, { name: "58433", refsource: "SECUNIA", url: "http://secunia.com/advisories/58433", }, { name: "60066", refsource: "SECUNIA", url: "http://secunia.com/advisories/60066", }, { name: "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", refsource: "CONFIRM", url: "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", }, { name: "https://access.redhat.com/site/blogs/766093/posts/908133", refsource: "CONFIRM", url: "https://access.redhat.com/site/blogs/766093/posts/908133", }, { name: "59301", refsource: "SECUNIA", url: "http://secunia.com/advisories/59301", }, { name: "60522", refsource: "SECUNIA", url: "http://secunia.com/advisories/60522", }, { name: "59784", refsource: "SECUNIA", url: "http://secunia.com/advisories/59784", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA80", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBST03097", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383410222440&w=2", }, { name: "20140607 Re: More OpenSSL issues", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Jun/38", }, { name: "HPSBMU03076", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { name: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", refsource: "CONFIRM", url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", }, { name: "59135", refsource: "SECUNIA", url: "http://secunia.com/advisories/59135", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "58759", refsource: "SECUNIA", url: "http://secunia.com/advisories/58759", }, { name: "59093", refsource: "SECUNIA", url: "http://secunia.com/advisories/59093", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", }, { name: "http://puppetlabs.com/security/cve/cve-2014-0224", refsource: "CONFIRM", url: "http://puppetlabs.com/security/cve/cve-2014-0224", }, { name: "59192", refsource: "SECUNIA", url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "58579", refsource: "SECUNIA", url: "http://secunia.com/advisories/58579", }, { name: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", refsource: "CONFIRM", url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", }, { name: "59040", refsource: "SECUNIA", url: "http://secunia.com/advisories/59040", }, { name: "HPSBMU03056", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", refsource: "SECUNIA", url: "http://secunia.com/advisories/59175", }, { name: "60819", refsource: "SECUNIA", url: "http://secunia.com/advisories/60819", }, { name: "HPSBMU03051", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", refsource: "SECUNIA", url: "http://secunia.com/advisories/59666", }, { name: "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", refsource: "CONFIRM", url: "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", }, { name: "58128", refsource: "SECUNIA", url: "http://secunia.com/advisories/58128", }, { name: "HPSBMU03055", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", refsource: "SECUNIA", url: "http://secunia.com/advisories/59413", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", }, { name: "59721", refsource: "SECUNIA", url: "http://secunia.com/advisories/59721", }, { name: "HPSBHF03145", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { name: "RHSA-2014:0680", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0680.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "59012", refsource: "SECUNIA", url: "http://secunia.com/advisories/59012", }, { name: "58713", refsource: "SECUNIA", url: "http://secunia.com/advisories/58713", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "59362", refsource: "SECUNIA", url: "http://secunia.com/advisories/59362", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "HPSBMU03070", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140499864129699&w=2", }, { name: "RHSA-2014:0631", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0631.html", }, { name: "59338", refsource: "SECUNIA", url: "http://secunia.com/advisories/59338", }, { name: "59450", refsource: "SECUNIA", url: "http://secunia.com/advisories/59450", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1053.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "VU#978508", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/978508", }, { name: "1031032", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1031032", }, { name: "59287", refsource: "SECUNIA", url: "http://secunia.com/advisories/59287", }, { name: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", refsource: "CONFIRM", url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", refsource: "SECUNIA", url: "http://secunia.com/advisories/59491", }, { name: "59364", refsource: "SECUNIA", url: "http://secunia.com/advisories/59364", }, { name: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", refsource: "CONFIRM", url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", }, { name: "59451", refsource: "SECUNIA", url: "http://secunia.com/advisories/59451", }, { name: "58977", refsource: "SECUNIA", url: "http://secunia.com/advisories/58977", }, { name: "https://www.novell.com/support/kb/doc.php?id=7015271", refsource: "CONFIRM", url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", }, { name: "60571", refsource: "SECUNIA", url: "http://secunia.com/advisories/60571", }, { name: "59459", refsource: "SECUNIA", url: "http://secunia.com/advisories/59459", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", }, { name: "60577", refsource: "SECUNIA", url: "http://secunia.com/advisories/60577", }, { name: "59448", refsource: "SECUNIA", url: "http://secunia.com/advisories/59448", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441", }, { name: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", refsource: "CONFIRM", url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", }, { name: "http://www.blackberry.com/btsc/KB36051", refsource: "CONFIRM", url: "http://www.blackberry.com/btsc/KB36051", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { name: "HPSBST03103", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141164638606214&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", }, { name: "59885", refsource: "SECUNIA", url: "http://secunia.com/advisories/59885", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "59202", refsource: "SECUNIA", url: "http://secunia.com/advisories/59202", }, { name: "RHSA-2014:0633", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0633.html", }, { name: "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", }, { name: "59375", refsource: "SECUNIA", url: "http://secunia.com/advisories/59375", }, { name: "HPSBMU03083", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140983229106599&w=2", }, { name: "59528", refsource: "SECUNIA", url: "http://secunia.com/advisories/59528", }, { name: "58337", refsource: "SECUNIA", url: "http://secunia.com/advisories/58337", }, { name: "59518", refsource: "SECUNIA", url: "http://secunia.com/advisories/59518", }, { name: "59389", refsource: "SECUNIA", url: "http://secunia.com/advisories/59389", }, { name: "59162", refsource: "SECUNIA", url: "http://secunia.com/advisories/59162", }, { name: "59383", refsource: "SECUNIA", url: "http://secunia.com/advisories/59383", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217", }, { name: "59490", refsource: "SECUNIA", url: "http://secunia.com/advisories/59490", }, { name: "59916", refsource: "SECUNIA", url: "http://secunia.com/advisories/59916", }, { name: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", refsource: "CONFIRM", url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", }, { name: "HPSBMU03065", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", }, { name: "IT02314", refsource: "AIXAPAR", url: "http://www.ibm.com/support/docview.wss?uid=swg1IT02314", }, { name: "59043", refsource: "SECUNIA", url: "http://secunia.com/advisories/59043", }, { name: "59347", refsource: "SECUNIA", url: "http://secunia.com/advisories/59347", }, { name: "60049", refsource: "SECUNIA", url: "http://secunia.com/advisories/60049", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", }, { name: "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005", refsource: "MISC", url: "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-0224", datePublished: "2014-06-05T21:00:00", dateReserved: "2013-12-03T00:00:00", dateUpdated: "2024-08-06T09:05:39.462Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3470
Vulnerability from cvelistv5
Published
2014-06-05 21:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.356Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59669", }, { name: "59525", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59525", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", }, { name: "59282", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59282", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015300", }, { name: "59990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59990", }, { name: "59264", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59264", }, { name: "59126", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59126", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015264", }, { name: "59306", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59306", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { name: "59445", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59445", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "HPSBUX03046", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59340", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59340", }, { name: "61254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61254", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", }, { name: "59223", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59223", }, { name: "59895", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59895", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=8011cd56e39a433b1837465259a9bd24a38727fb", }, { name: "59449", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59449", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "59442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59442", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59189", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59189", }, { name: "MDVSA-2014:106", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "58742", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58742", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59300", }, { name: "58667", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58667", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "59191", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59191", }, { name: "59284", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59284", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59365", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "59483", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59483", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "59495", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59495", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58945", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "59659", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59659", }, { name: "59440", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59440", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59655", }, { name: "58716", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58716", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "59310", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59310", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAM2D", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.citrix.com/article/CTX140876", }, { name: "59167", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59167", }, { name: "59120", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59120", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "HPSBMU03069", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140499827729550&w=2", }, { name: "MDVSA-2014:105", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105", }, { name: "59460", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59460", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59514", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59438", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", }, { name: "58714", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15342.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58615", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT6443", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59301", }, { name: "59784", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59784", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "67898", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/67898", }, { name: "59192", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "58579", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58579", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59175", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59413", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59721", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "59362", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59362", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59450", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59491", }, { name: "59364", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59364", }, { name: "59451", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59451", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58977", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "60571", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60571", }, { name: "59459", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59459", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.blackberry.com/btsc/KB36051", }, { name: "59431", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59431", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58337", }, { name: "59518", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59518", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59162", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103600", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59490", }, { name: "59916", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59916", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", }, { name: "HPSBMU03065", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, { name: "58797", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58797", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-06-05T00:00:00", descriptions: [ { lang: "en", value: "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:38", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59669", }, { name: "59525", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59525", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", }, { name: "59282", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59282", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015300", }, { name: "59990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59990", }, { name: "59264", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59264", }, { name: "59126", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59126", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015264", }, { name: "59306", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59306", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { name: "59445", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59445", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "HPSBUX03046", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59340", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59340", }, { name: "61254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61254", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", }, { name: "59223", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59223", }, { name: "59895", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59895", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=8011cd56e39a433b1837465259a9bd24a38727fb", }, { name: "59449", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59449", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "59442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59442", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59189", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59189", }, { name: "MDVSA-2014:106", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "58742", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58742", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59300", }, { name: "58667", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58667", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "59191", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59191", }, { name: "59284", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59284", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59365", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "59483", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59483", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "59495", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59495", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58945", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "59659", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59659", }, { name: "59440", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59440", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59655", }, { name: "58716", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58716", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "59310", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59310", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.splunk.com/view/SP-CAAAM2D", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.citrix.com/article/CTX140876", }, { name: "59167", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59167", }, { name: "59120", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59120", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "HPSBMU03069", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140499827729550&w=2", }, { name: "MDVSA-2014:105", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105", }, { name: "59460", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59460", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59514", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59438", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", }, { name: "58714", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15342.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58615", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT6443", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59301", }, { name: "59784", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59784", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "67898", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/67898", }, { name: "59192", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "58579", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58579", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59175", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59413", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59721", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "59362", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59362", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59450", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59491", }, { name: "59364", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59364", }, { name: "59451", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59451", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58977", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "60571", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60571", }, { name: "59459", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59459", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.blackberry.com/btsc/KB36051", }, { name: "59431", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59431", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58337", }, { name: "59518", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59518", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59162", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103600", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59490", }, { name: "59916", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59916", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", }, { name: "HPSBMU03065", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, { name: "58797", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58797", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3470", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "59342", refsource: "SECUNIA", url: "http://secunia.com/advisories/59342", }, { name: "59669", refsource: "SECUNIA", url: "http://secunia.com/advisories/59669", }, { name: "59525", refsource: "SECUNIA", url: "http://secunia.com/advisories/59525", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", }, { name: "59282", refsource: "SECUNIA", url: "http://secunia.com/advisories/59282", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015300", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015300", }, { name: "59990", refsource: "SECUNIA", url: "http://secunia.com/advisories/59990", }, { name: "59264", refsource: "SECUNIA", url: "http://secunia.com/advisories/59264", }, { name: "59126", refsource: "SECUNIA", url: "http://secunia.com/advisories/59126", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015264", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015264", }, { name: "59306", refsource: "SECUNIA", url: "http://secunia.com/advisories/59306", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { name: "59445", refsource: "SECUNIA", url: "http://secunia.com/advisories/59445", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "HPSBUX03046", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59340", refsource: "SECUNIA", url: "http://secunia.com/advisories/59340", }, { name: "61254", refsource: "SECUNIA", url: "http://secunia.com/advisories/61254", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { name: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", refsource: "CONFIRM", url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", }, { name: "59223", refsource: "SECUNIA", url: "http://secunia.com/advisories/59223", }, { name: "59895", refsource: "SECUNIA", url: "http://secunia.com/advisories/59895", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8011cd56e39a433b1837465259a9bd24a38727fb", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8011cd56e39a433b1837465259a9bd24a38727fb", }, { name: "59449", refsource: "SECUNIA", url: "http://secunia.com/advisories/59449", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "59442", refsource: "SECUNIA", url: "http://secunia.com/advisories/59442", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", refsource: "SECUNIA", url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59189", refsource: "SECUNIA", url: "http://secunia.com/advisories/59189", }, { name: "MDVSA-2014:106", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "58742", refsource: "SECUNIA", url: "http://secunia.com/advisories/58742", }, { name: "59300", refsource: "SECUNIA", url: "http://secunia.com/advisories/59300", }, { name: "58667", refsource: "SECUNIA", url: "http://secunia.com/advisories/58667", }, { name: "GLSA-201407-05", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "59191", refsource: "SECUNIA", url: "http://secunia.com/advisories/59191", }, { name: "59284", refsource: "SECUNIA", url: "http://secunia.com/advisories/59284", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg24037783", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", refsource: "SECUNIA", url: "http://secunia.com/advisories/59365", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "59483", refsource: "SECUNIA", url: "http://secunia.com/advisories/59483", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "59495", refsource: "SECUNIA", url: "http://secunia.com/advisories/59495", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", refsource: "SECUNIA", url: "http://secunia.com/advisories/58945", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "59659", refsource: "SECUNIA", url: "http://secunia.com/advisories/59659", }, { name: "59440", refsource: "SECUNIA", url: "http://secunia.com/advisories/59440", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", refsource: "SECUNIA", url: "http://secunia.com/advisories/59655", }, { name: "58716", refsource: "SECUNIA", url: "http://secunia.com/advisories/58716", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", refsource: "SECUNIA", url: "http://secunia.com/advisories/59437", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "59310", refsource: "SECUNIA", url: "http://secunia.com/advisories/59310", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { name: "http://www.splunk.com/view/SP-CAAAM2D", refsource: "CONFIRM", url: "http://www.splunk.com/view/SP-CAAAM2D", }, { name: "SUSE-SU-2015:0743", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676793", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676356", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { name: "http://support.citrix.com/article/CTX140876", refsource: "CONFIRM", url: "http://support.citrix.com/article/CTX140876", }, { name: "59167", refsource: "SECUNIA", url: "http://secunia.com/advisories/59167", }, { name: "59120", refsource: "SECUNIA", url: "http://secunia.com/advisories/59120", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "HPSBMU03069", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140499827729550&w=2", }, { name: "MDVSA-2014:105", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105", }, { name: "59460", refsource: "SECUNIA", url: "http://secunia.com/advisories/59460", }, { name: "58939", refsource: "SECUNIA", url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59514", refsource: "SECUNIA", url: "http://secunia.com/advisories/59514", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", refsource: "SECUNIA", url: "http://secunia.com/advisories/59438", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", }, { name: "58714", refsource: "SECUNIA", url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15342.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15342.html", }, { name: "http://www.openssl.org/news/secadv_20140605.txt", refsource: "CONFIRM", url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", refsource: "SECUNIA", url: "http://secunia.com/advisories/58615", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "SUSE-SU-2015:0578", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "http://support.apple.com/kb/HT6443", refsource: "CONFIRM", url: "http://support.apple.com/kb/HT6443", }, { name: "59301", refsource: "SECUNIA", url: "http://secunia.com/advisories/59301", }, { name: "59784", refsource: "SECUNIA", url: "http://secunia.com/advisories/59784", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA80", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { name: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", refsource: "CONFIRM", url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "67898", refsource: "BID", url: "http://www.securityfocus.com/bid/67898", }, { name: "59192", refsource: "SECUNIA", url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "58579", refsource: "SECUNIA", url: "http://secunia.com/advisories/58579", }, { name: "HPSBMU03056", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", refsource: "SECUNIA", url: "http://secunia.com/advisories/59175", }, { name: "HPSBMU03051", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", refsource: "SECUNIA", url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", refsource: "SECUNIA", url: "http://secunia.com/advisories/59413", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { name: "59721", refsource: "SECUNIA", url: "http://secunia.com/advisories/59721", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "58713", refsource: "SECUNIA", url: "http://secunia.com/advisories/58713", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "59362", refsource: "SECUNIA", url: "http://secunia.com/advisories/59362", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", refsource: "SECUNIA", url: "http://secunia.com/advisories/59450", }, { name: "59287", refsource: "SECUNIA", url: "http://secunia.com/advisories/59287", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", refsource: "SECUNIA", url: "http://secunia.com/advisories/59491", }, { name: "59364", refsource: "SECUNIA", url: "http://secunia.com/advisories/59364", }, { name: "59451", refsource: "SECUNIA", url: "http://secunia.com/advisories/59451", }, { name: "58977", refsource: "SECUNIA", url: "http://secunia.com/advisories/58977", }, { name: "https://www.novell.com/support/kb/doc.php?id=7015271", refsource: "CONFIRM", url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "60571", refsource: "SECUNIA", url: "http://secunia.com/advisories/60571", }, { name: "59459", refsource: "SECUNIA", url: "http://secunia.com/advisories/59459", }, { name: "http://www.blackberry.com/btsc/KB36051", refsource: "CONFIRM", url: "http://www.blackberry.com/btsc/KB36051", }, { name: "59431", refsource: "SECUNIA", url: "http://secunia.com/advisories/59431", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "58337", refsource: "SECUNIA", url: "http://secunia.com/advisories/58337", }, { name: "59518", refsource: "SECUNIA", url: "http://secunia.com/advisories/59518", }, { name: "59162", refsource: "SECUNIA", url: "http://secunia.com/advisories/59162", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1103600", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103600", }, { name: "59490", refsource: "SECUNIA", url: "http://secunia.com/advisories/59490", }, { name: "59916", refsource: "SECUNIA", url: "http://secunia.com/advisories/59916", }, { name: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", refsource: "CONFIRM", url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", }, { name: "HPSBMU03065", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, { name: "58797", refsource: "SECUNIA", url: "http://secunia.com/advisories/58797", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3470", datePublished: "2014-06-05T21:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.356Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-8176
Vulnerability from cvelistv5
Published
2015-06-12 00:00
Modified
2024-08-06 13:10
Severity ?
EPSS score ?
Summary
The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:10:50.919Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-3287", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { tags: [ "x_transferred", ], url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { tags: [ "x_transferred", ], url: "https://openssl.org/news/secadv/20150611.txt", }, { name: "RHSA-2015:1115", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1115.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", }, { name: "1032564", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032564", }, { name: "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "75159", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/75159", }, { name: "USN-2639-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2639-1", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { tags: [ "x_transferred", ], url: "https://github.com/openssl/openssl/commit/470990fee0182566d439ef7e82d1abf18b7085d7", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201506-02", }, { tags: [ "x_transferred", ], url: "https://rt.openssl.org/Ticket/Display.html?id=3286&user=guest&pass=guest", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa98", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", "x_transferred", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150611.txt", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-06-11T00:00:00", descriptions: [ { lang: "en", value: "The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "DSA-3287", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { url: "https://openssl.org/news/secadv/20150611.txt", }, { name: "RHSA-2015:1115", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1115.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", }, { name: "1032564", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032564", }, { name: "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "75159", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/75159", }, { name: "USN-2639-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2639-1", }, { url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { url: "https://github.com/openssl/openssl/commit/470990fee0182566d439ef7e82d1abf18b7085d7", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201506-02", }, { url: "https://rt.openssl.org/Ticket/Display.html?id=3286&user=guest&pass=guest", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa98", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { url: "https://www.openssl.org/news/secadv_20150611.txt", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-8176", datePublished: "2015-06-12T00:00:00", dateReserved: "2014-10-10T00:00:00", dateUpdated: "2024-08-06T13:10:50.919Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-8275
Vulnerability from cvelistv5
Published
2015-01-09 02:00
Modified
2024-08-06 13:10
Severity ?
EPSS score ?
Summary
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:10:50.928Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "HPSBOV03318", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBGN03299", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT204659", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "FEDORA-2015-0601", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/openssl/openssl/commit/cb62ab4b17818fe66d2fed0a7fe71969131c811b", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "HPSBUX03244", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "71935", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71935", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "SSRT101987", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SSRT101885", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3125", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/openssl/openssl/commit/684400ce192dac51df3d3e92b61830a6ef90be3e", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-01-08T00:00:00", descriptions: [ { lang: "en", value: "OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-14T10:57:01", orgId: "37e5125f-f79b-445b-8fad-9564f167944b", shortName: "certcc", }, references: [ { name: "HPSBOV03318", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBGN03299", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT204659", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "FEDORA-2015-0601", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/openssl/openssl/commit/cb62ab4b17818fe66d2fed0a7fe71969131c811b", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "HPSBUX03244", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "71935", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71935", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "SSRT101987", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SSRT101885", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3125", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/openssl/openssl/commit/684400ce192dac51df3d3e92b61830a6ef90be3e", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cert@cert.org", ID: "CVE-2014-8275", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "HPSBOV03318", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBGN03299", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "HPSBMU03409", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "https://support.apple.com/HT204659", refsource: "CONFIRM", url: "https://support.apple.com/HT204659", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "FEDORA-2015-0601", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "https://www.openssl.org/news/secadv_20150108.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "https://github.com/openssl/openssl/commit/cb62ab4b17818fe66d2fed0a7fe71969131c811b", refsource: "CONFIRM", url: "https://github.com/openssl/openssl/commit/cb62ab4b17818fe66d2fed0a7fe71969131c811b", }, { name: "RHSA-2015:0066", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "HPSBUX03244", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "71935", refsource: "BID", url: "http://www.securityfocus.com/bid/71935", }, { name: "RHSA-2015:0800", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "HPSBMU03396", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "SSRT101987", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "https://support.citrix.com/article/CTX216642", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SSRT101885", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "https://bto.bluecoat.com/security-advisory/sa88", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "https://github.com/openssl/openssl/commit/684400ce192dac51df3d3e92b61830a6ef90be3e", refsource: "CONFIRM", url: "https://github.com/openssl/openssl/commit/684400ce192dac51df3d3e92b61830a6ef90be3e", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b", assignerShortName: "certcc", cveId: "CVE-2014-8275", datePublished: "2015-01-09T02:00:00", dateReserved: "2014-10-12T00:00:00", dateUpdated: "2024-08-06T13:10:50.928Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-0209
Vulnerability from cvelistv5
Published
2015-03-19 00:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:03:09.978Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { name: "openSUSE-SU-2015:0554", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "DSA-3197", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3197", }, { name: "USN-2537-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa92", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150319.txt", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "FEDORA-2015-6951", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_transferred", ], url: "https://access.redhat.com/articles/1384453", }, { name: "RHSA-2016:1089", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1089.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1196737", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "SUSE-SU-2015:0541", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { name: "HPSBGN03306", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2", }, { tags: [ "x_transferred", ], url: "http://support.apple.com/kb/HT204942", }, { name: "FreeBSD-SA-15:06", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1031929", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "73239", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/73239", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "FEDORA-2015-6855", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201503-11", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-03-19T00:00:00", descriptions: [ { lang: "en", value: "Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { name: "openSUSE-SU-2015:0554", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "DSA-3197", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3197", }, { name: "USN-2537-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa92", }, { url: "https://www.openssl.org/news/secadv_20150319.txt", }, { url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "FEDORA-2015-6951", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { url: "https://access.redhat.com/articles/1384453", }, { name: "RHSA-2016:1089", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1089.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1196737", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "SUSE-SU-2015:0541", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { name: "HPSBGN03306", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2", }, { url: "http://support.apple.com/kb/HT204942", }, { name: "FreeBSD-SA-15:06", tags: [ "vendor-advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1031929", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "73239", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/73239", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { url: "https://support.citrix.com/article/CTX216642", }, { name: "FEDORA-2015-6855", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201503-11", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-0209", datePublished: "2015-03-19T00:00:00", dateReserved: "2014-11-18T00:00:00", dateUpdated: "2024-08-06T04:03:09.978Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-0286
Vulnerability from cvelistv5
Published
2015-03-19 00:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:03:10.760Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { name: "openSUSE-SU-2015:0554", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "DSA-3197", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3197", }, { name: "USN-2537-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa92", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150319.txt", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/HT205212", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "FEDORA-2015-6951", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_transferred", ], url: "https://access.redhat.com/articles/1384453", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "1032917", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032917", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/HT205267", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202366", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "SUSE-SU-2015:0541", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { name: "HPSBGN03306", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2", }, { tags: [ "x_transferred", ], url: "http://support.apple.com/kb/HT204942", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "FreeBSD-SA-15:06", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1031929", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "APPLE-SA-2015-09-16-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "FEDORA-2015-6855", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "73225", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/73225", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-03-19T00:00:00", descriptions: [ { lang: "en", value: "The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { name: "openSUSE-SU-2015:0554", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "DSA-3197", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3197", }, { name: "USN-2537-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa92", }, { url: "https://www.openssl.org/news/secadv_20150319.txt", }, { url: "https://support.apple.com/HT205212", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "FEDORA-2015-6951", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { url: "https://access.redhat.com/articles/1384453", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "1032917", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032917", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { url: "https://support.apple.com/HT205267", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202366", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "SUSE-SU-2015:0541", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { url: "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { name: "HPSBGN03306", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2", }, { url: "http://support.apple.com/kb/HT204942", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "FreeBSD-SA-15:06", tags: [ "vendor-advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1", }, { name: "RHSA-2016:2957", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2957.html", }, { name: "1031929", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "APPLE-SA-2015-09-16-1", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { url: "https://support.citrix.com/article/CTX216642", }, { name: "FEDORA-2015-6855", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "73225", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/73225", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-0286", datePublished: "2015-03-19T00:00:00", dateReserved: "2014-11-18T00:00:00", dateUpdated: "2024-08-06T04:03:10.760Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-0289
Vulnerability from cvelistv5
Published
2015-03-19 00:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:03:10.842Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { name: "openSUSE-SU-2015:0554", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "DSA-3197", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3197", }, { name: "USN-2537-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa92", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150319.txt", }, { name: "73231", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/73231", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c0334c2c92dd1bc3ad8138ba6e74006c3631b0f9", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "FEDORA-2015-6951", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_transferred", ], url: "https://access.redhat.com/articles/1384453", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "SUSE-SU-2015:0541", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { name: "HPSBGN03306", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2", }, { tags: [ "x_transferred", ], url: "http://support.apple.com/kb/HT204942", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202384", }, { name: "FreeBSD-SA-15:06", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "1031929", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { name: "FEDORA-2015-6855", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201503-11", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-03-19T00:00:00", descriptions: [ { lang: "en", value: "The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { name: "openSUSE-SU-2015:0554", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "DSA-3197", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3197", }, { name: "USN-2537-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa92", }, { url: "https://www.openssl.org/news/secadv_20150319.txt", }, { name: "73231", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/73231", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c0334c2c92dd1bc3ad8138ba6e74006c3631b0f9", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "FEDORA-2015-6951", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { url: "https://access.redhat.com/articles/1384453", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "SUSE-SU-2015:0541", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { url: "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { name: "HPSBGN03306", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2", }, { url: "http://support.apple.com/kb/HT204942", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202384", }, { name: "FreeBSD-SA-15:06", tags: [ "vendor-advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "1031929", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { name: "FEDORA-2015-6855", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201503-11", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-0289", datePublished: "2015-03-19T00:00:00", dateReserved: "2014-11-18T00:00:00", dateUpdated: "2024-08-06T04:03:10.842Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-1791
Vulnerability from cvelistv5
Published
2015-06-12 00:00
Modified
2024-08-06 04:54
Severity ?
EPSS score ?
Summary
Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:54:16.425Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2015:1184", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", }, { name: "SSRT102180", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "DSA-3287", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { name: "SUSE-SU-2015:1150", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { tags: [ "x_transferred", ], url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965", }, { tags: [ "x_transferred", ], url: "https://openssl.org/news/secadv/20150611.txt", }, { name: "75161", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/75161", }, { name: "RHSA-2015:1115", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1115.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "1032479", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032479", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "SUSE-SU-2015:1182", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "SUSE-SU-2015:1143", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { tags: [ "x_transferred", ], url: "https://github.com/openssl/openssl/commit/98ece4eebfb6cd45cc8d550c6ac0022965071afc", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960041", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015", }, { name: "FEDORA-2015-10108", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", }, { name: "APPLE-SA-2015-08-13-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "USN-2639-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2639-1", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201506-02", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044", }, { name: "91787", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "HPSBUX03388", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", }, { name: "FEDORA-2015-10047", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT205031", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694", }, { name: "openSUSE-SU-2015:1139", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa98", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", "x_transferred", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150611.txt", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-06-11T00:00:00", descriptions: [ { lang: "en", value: "Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "SUSE-SU-2015:1184", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", }, { name: "SSRT102180", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "DSA-3287", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { name: "SUSE-SU-2015:1150", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965", }, { url: "https://openssl.org/news/secadv/20150611.txt", }, { name: "75161", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/75161", }, { name: "RHSA-2015:1115", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1115.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "1032479", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032479", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "SUSE-SU-2015:1182", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "SUSE-SU-2015:1143", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { url: "https://github.com/openssl/openssl/commit/98ece4eebfb6cd45cc8d550c6ac0022965071afc", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960041", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015", }, { name: "FEDORA-2015-10108", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", }, { name: "APPLE-SA-2015-08-13-2", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "USN-2639-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2639-1", }, { url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201506-02", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044", }, { name: "91787", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "HPSBUX03388", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", }, { name: "FEDORA-2015-10047", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html", }, { url: "https://support.apple.com/kb/HT205031", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { url: "https://support.citrix.com/article/CTX216642", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694", }, { name: "openSUSE-SU-2015:1139", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa98", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { url: "https://www.openssl.org/news/secadv_20150611.txt", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-1791", datePublished: "2015-06-12T00:00:00", dateReserved: "2015-02-17T00:00:00", dateUpdated: "2024-08-06T04:54:16.425Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-0160
Vulnerability from cvelistv5
Published
2014-04-07 00:00
Modified
2025-02-07 13:32
Severity ?
EPSS score ?
Summary
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T09:05:39.056Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217", }, { name: "1030077", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1030077", }, { name: "20140408 heartbleed OpenSSL bug CVE-2014-0160", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Apr/90", }, { tags: [ "x_transferred", ], url: "http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/", }, { name: "DSA-2896", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2896", }, { name: "HPSBGN03008", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139774054614965&w=2", }, { name: "HPSBMU03024", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139889113431619&w=2", }, { name: "RHSA-2014:0396", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0396.html", }, { name: "HPSBHF03021", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139835815211508&w=2", }, { name: "HPSBHF03136", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141287864628122&w=2", }, { name: "VU#720951", tags: [ "third-party-advisory", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/720951", }, { tags: [ "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAMB3", }, { name: "HPSBMU03033", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139905295427946&w=2", }, { tags: [ "x_transferred", ], url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { tags: [ "x_transferred", ], url: "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf", }, { name: "HPSBGN03011", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139833395230364&w=2", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670161", }, { tags: [ "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "openSUSE-SU-2014:0492", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "20140409 Re: heartbleed OpenSSL bug CVE-2014-0160", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Apr/109", }, { name: "HPSBMU03037", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140724451518351&w=2", }, { name: "1030080", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1030080", }, { name: "57836", tags: [ "third-party-advisory", "x_transferred", ], url: "http://secunia.com/advisories/57836", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "HPSBMU03012", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139808058921905&w=2", }, { name: "HPSBST03001", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139758572430452&w=2", }, { name: "66690", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/66690", }, { tags: [ "x_transferred", ], url: "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", }, { tags: [ "x_transferred", ], url: "https://filezilla-project.org/versions.php?type=server", }, { name: "HPSBMU03023", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139843768401936&w=2", }, { name: "57483", tags: [ "third-party-advisory", "x_transferred", ], url: "http://secunia.com/advisories/57483", }, { name: "20140409 OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed", }, { tags: [ "x_transferred", ], url: "http://www.kerio.com/support/kerio-control/release-history", }, { tags: [ "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2014-0165.html", }, { tags: [ "x_transferred", ], url: "http://www.blackberry.com/btsc/KB35882", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "HPSBMU03044", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140075368411126&w=2", }, { name: "HPSBMU03030", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139905351928096&w=2", }, { name: "1030081", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1030081", }, { name: "FEDORA-2014-4879", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "FEDORA-2014-4910", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1084875", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "HPSBMU03013", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139824993005633&w=2", }, { name: "1030079", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1030079", }, { name: "RHSA-2014:0377", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0377.html", }, { name: "HPSBMU02995", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139722163017074&w=2", }, { name: "HPSBPI03031", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139889295732144&w=2", }, { tags: [ "x_transferred", ], url: "https://code.google.com/p/mod-spdy/issues/detail?id=85", }, { name: "HPSBMU02999", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139765756720506&w=2", }, { name: "HPSBGN03010", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139774703817488&w=2", }, { name: "HPSBMU03029", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139905202427693&w=2", }, { tags: [ "x_transferred", ], url: "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/", }, { tags: [ "x_transferred", ], url: "http://heartbleed.com/", }, { name: "HPSBMU03018", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139817782017443&w=2", }, { tags: [ "x_transferred", ], url: "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01", }, { name: "HPSBMU03040", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140015787404650&w=2", }, { tags: [ "x_transferred", ], url: "http://cogentdatahub.com/ReleaseNotes.html", }, { name: "HPSBMU03025", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139869720529462&w=2", }, { name: "HPSBST03016", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139842151128341&w=2", }, { name: "HPSBMU03028", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139905243827825&w=2", }, { name: "HPSBMU03009", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139905458328378&w=2", }, { tags: [ "x_transferred", ], url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-1", }, { name: "TA14-098A", tags: [ "third-party-advisory", "x_transferred", ], url: "http://www.us-cert.gov/ncas/alerts/TA14-098A", }, { name: "57347", tags: [ "third-party-advisory", "x_transferred", ], url: "http://secunia.com/advisories/57347", }, { name: "[syslog-ng-announce] 20140411 syslog-ng Premium Edition 5 LTS (5.0.4a) has been released", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html", }, { name: "20140411 MRI Rubies may contain statically linked, vulnerable OpenSSL", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Apr/173", }, { tags: [ "x_transferred", ], url: "https://blog.torproject.org/blog/openssl-bug-cve-2014-0160", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html", }, { tags: [ "x_transferred", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html", }, { tags: [ "x_transferred", ], url: "http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3", }, { name: "HPSBST03000", tags: [ "vendor-advisory", "x_transferred", ], url: "https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "HPSBST03004", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139905653828999&w=2", }, { name: "USN-2165-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2165-1", }, { name: "RHSA-2014:0378", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0378.html", }, { name: "HPSBMU02997", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139757919027752&w=2", }, { name: "SUSE-SA:2014:002", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html", }, { name: "32764", tags: [ "exploit", "x_transferred", ], url: "http://www.exploit-db.com/exploits/32764", }, { name: "HPSBMU02994", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139757726426985&w=2", }, { tags: [ "x_transferred", ], url: "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00", }, { name: "HPSBMU03022", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139869891830365&w=2", }, { name: "HPSBST03027", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139905868529690&w=2", }, { name: "HPSBMU03019", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139817685517037&w=2", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "20140408 Re: heartbleed OpenSSL bug CVE-2014-0160", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Apr/91", }, { name: "1030078", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1030078", }, { name: "59243", tags: [ "third-party-advisory", "x_transferred", ], url: "http://secunia.com/advisories/59243", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661", }, { name: "HPSBMU03020", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139836085512508&w=2", }, { name: "HPSBST03015", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139824923705461&w=2", }, { name: "RHSA-2014:0376", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0376.html", }, { name: "HPSBPI03014", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139835844111589&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_transferred", ], url: "https://www.cert.fi/en/reports/2014/vulnerability788210.html", }, { name: "57721", tags: [ "third-party-advisory", "x_transferred", ], url: "http://secunia.com/advisories/57721", }, { name: "57968", tags: [ "third-party-advisory", "x_transferred", ], url: "http://secunia.com/advisories/57968", }, { tags: [ "x_transferred", ], url: "http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/", }, { tags: [ "x_transferred", ], url: "http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3", }, { name: "openSUSE-SU-2014:0560", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html", }, { name: "HPSBMU03032", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139905405728262&w=2", }, { name: "1030082", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1030082", }, { name: "HPSBMU02998", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139757819327350&w=2", }, { name: "32745", tags: [ "exploit", "x_transferred", ], url: "http://www.exploit-db.com/exploits/32745", }, { name: "20140412 Re: heartbleed OpenSSL bug CVE-2014-0160", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Apr/190", }, { tags: [ "x_transferred", ], url: "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/", }, { name: "HPSBMU03017", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=139817727317190&w=2", }, { tags: [ "x_transferred", ], url: "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008", }, { tags: [ "x_transferred", ], url: "http://www.openssl.org/news/secadv_20140407.txt", }, { tags: [ "x_transferred", ], url: "https://gist.github.com/chapmajs/10473815", }, { tags: [ "x_transferred", ], url: "http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1", }, { name: "1030074", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1030074", }, { tags: [ "x_transferred", ], url: "http://support.citrix.com/article/CTX140605", }, { name: "59139", tags: [ "third-party-advisory", "x_transferred", ], url: "http://secunia.com/advisories/59139", }, { tags: [ "x_transferred", ], url: "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/", }, { name: "57966", tags: [ "third-party-advisory", "x_transferred", ], url: "http://secunia.com/advisories/57966", }, { name: "1030026", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1030026", }, { name: "59347", tags: [ "third-party-advisory", "x_transferred", ], url: "http://secunia.com/advisories/59347", }, { name: "[tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E", }, { name: "[tomcat-dev] 20190325 svn commit: r1856174 [26/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E", }, { tags: [ "x_transferred", ], url: "https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html", }, { name: "[tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf", }, { name: "[tomcat-dev] 20200213 svn commit: r1873980 [31/34] - /tomcat/site/trunk/docs/", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E", }, { tags: [ "x_transferred", ], url: "https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2014-0160", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-02-07T13:32:34.600181Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-05-04", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2014-0160", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125 Out-of-bounds Read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-07T13:32:37.531Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-04-07T00:00:00.000Z", descriptions: [ { lang: "en", value: "The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-15T00:00:00.000Z", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217", }, { name: "1030077", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1030077", }, { name: "20140408 heartbleed OpenSSL bug CVE-2014-0160", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2014/Apr/90", }, { url: "http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/", }, { name: "DSA-2896", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2014/dsa-2896", }, { name: "HPSBGN03008", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139774054614965&w=2", }, { name: "HPSBMU03024", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139889113431619&w=2", }, { name: "RHSA-2014:0396", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0396.html", }, { name: "HPSBHF03021", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139835815211508&w=2", }, { name: "HPSBHF03136", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=141287864628122&w=2", }, { name: "VU#720951", tags: [ "third-party-advisory", ], url: "http://www.kb.cert.org/vuls/id/720951", }, { url: "http://www.splunk.com/view/SP-CAAAMB3", }, { name: "HPSBMU03033", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139905295427946&w=2", }, { url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { url: "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf", }, { name: "HPSBGN03011", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139833395230364&w=2", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21670161", }, { url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "openSUSE-SU-2014:0492", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html", }, { name: "SSRT101846", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "20140409 Re: heartbleed OpenSSL bug CVE-2014-0160", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2014/Apr/109", }, { name: "HPSBMU03037", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=140724451518351&w=2", }, { name: "1030080", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1030080", }, { name: "57836", tags: [ "third-party-advisory", ], url: "http://secunia.com/advisories/57836", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "HPSBMU03012", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139808058921905&w=2", }, { name: "HPSBST03001", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139758572430452&w=2", }, { name: "66690", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/66690", }, { url: "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", }, { url: "https://filezilla-project.org/versions.php?type=server", }, { name: "HPSBMU03023", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139843768401936&w=2", }, { name: "57483", tags: [ "third-party-advisory", ], url: "http://secunia.com/advisories/57483", }, { name: "20140409 OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed", }, { url: "http://www.kerio.com/support/kerio-control/release-history", }, { url: "http://advisories.mageia.org/MGASA-2014-0165.html", }, { url: "http://www.blackberry.com/btsc/KB35882", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "HPSBMU03044", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=140075368411126&w=2", }, { name: "HPSBMU03030", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139905351928096&w=2", }, { name: "1030081", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1030081", }, { name: "FEDORA-2014-4879", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "FEDORA-2014-4910", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1084875", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "HPSBMU03013", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139824993005633&w=2", }, { name: "1030079", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1030079", }, { name: "RHSA-2014:0377", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0377.html", }, { name: "HPSBMU02995", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139722163017074&w=2", }, { name: "HPSBPI03031", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139889295732144&w=2", }, { url: "https://code.google.com/p/mod-spdy/issues/detail?id=85", }, { name: "HPSBMU02999", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139765756720506&w=2", }, { name: "HPSBGN03010", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139774703817488&w=2", }, { name: "HPSBMU03029", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139905202427693&w=2", }, { url: "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/", }, { url: "http://heartbleed.com/", }, { name: "HPSBMU03018", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139817782017443&w=2", }, { url: "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01", }, { name: "HPSBMU03040", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=140015787404650&w=2", }, { url: "http://cogentdatahub.com/ReleaseNotes.html", }, { name: "HPSBMU03025", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139869720529462&w=2", }, { name: "HPSBST03016", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139842151128341&w=2", }, { name: "HPSBMU03028", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139905243827825&w=2", }, { name: "HPSBMU03009", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139905458328378&w=2", }, { url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-1", }, { name: "TA14-098A", tags: [ "third-party-advisory", ], url: "http://www.us-cert.gov/ncas/alerts/TA14-098A", }, { name: "57347", tags: [ "third-party-advisory", ], url: "http://secunia.com/advisories/57347", }, { name: "[syslog-ng-announce] 20140411 syslog-ng Premium Edition 5 LTS (5.0.4a) has been released", tags: [ "mailing-list", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html", }, { name: "20140411 MRI Rubies may contain statically linked, vulnerable OpenSSL", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2014/Apr/173", }, { url: "https://blog.torproject.org/blog/openssl-bug-cve-2014-0160", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { url: "http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html", }, { url: "https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html", }, { url: "http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3", }, { name: "HPSBST03000", tags: [ "vendor-advisory", ], url: "https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "HPSBST03004", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139905653828999&w=2", }, { name: "USN-2165-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2165-1", }, { name: "RHSA-2014:0378", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0378.html", }, { name: "HPSBMU02997", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139757919027752&w=2", }, { name: "SUSE-SA:2014:002", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html", }, { name: "32764", tags: [ "exploit", ], url: "http://www.exploit-db.com/exploits/32764", }, { name: "HPSBMU02994", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139757726426985&w=2", }, { url: "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00", }, { name: "HPSBMU03022", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139869891830365&w=2", }, { name: "HPSBST03027", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139905868529690&w=2", }, { name: "HPSBMU03019", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139817685517037&w=2", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "20140408 Re: heartbleed OpenSSL bug CVE-2014-0160", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2014/Apr/91", }, { name: "1030078", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1030078", }, { name: "59243", tags: [ "third-party-advisory", ], url: "http://secunia.com/advisories/59243", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661", }, { name: "HPSBMU03020", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139836085512508&w=2", }, { name: "HPSBST03015", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139824923705461&w=2", }, { name: "RHSA-2014:0376", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0376.html", }, { name: "HPSBPI03014", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139835844111589&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { url: "https://www.cert.fi/en/reports/2014/vulnerability788210.html", }, { name: "57721", tags: [ "third-party-advisory", ], url: "http://secunia.com/advisories/57721", }, { name: "57968", tags: [ "third-party-advisory", ], url: "http://secunia.com/advisories/57968", }, { url: "http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/", }, { url: "http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3", }, { name: "openSUSE-SU-2014:0560", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html", }, { name: "HPSBMU03032", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139905405728262&w=2", }, { name: "1030082", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1030082", }, { name: "HPSBMU02998", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139757819327350&w=2", }, { name: "32745", tags: [ "exploit", ], url: "http://www.exploit-db.com/exploits/32745", }, { name: "20140412 Re: heartbleed OpenSSL bug CVE-2014-0160", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2014/Apr/190", }, { url: "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/", }, { name: "HPSBMU03017", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=139817727317190&w=2", }, { url: "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008", }, { url: "http://www.openssl.org/news/secadv_20140407.txt", }, { url: "https://gist.github.com/chapmajs/10473815", }, { url: "http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1", }, { name: "1030074", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1030074", }, { url: "http://support.citrix.com/article/CTX140605", }, { name: "59139", tags: [ "third-party-advisory", ], url: "http://secunia.com/advisories/59139", }, { url: "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/", }, { name: "57966", tags: [ "third-party-advisory", ], url: "http://secunia.com/advisories/57966", }, { name: "1030026", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1030026", }, { name: "59347", tags: [ "third-party-advisory", ], url: "http://secunia.com/advisories/59347", }, { name: "[tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", tags: [ "mailing-list", ], url: "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E", }, { name: "[tomcat-dev] 20190325 svn commit: r1856174 [26/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", tags: [ "mailing-list", ], url: "https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E", }, { url: "https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html", }, { name: "[tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/", tags: [ "mailing-list", ], url: "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf", }, { name: "[tomcat-dev] 20200213 svn commit: r1873980 [31/34] - /tomcat/site/trunk/docs/", tags: [ "mailing-list", ], url: "https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E", }, { url: "https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-0160", datePublished: "2014-04-07T00:00:00.000Z", dateReserved: "2013-12-03T00:00:00.000Z", dateUpdated: "2025-02-07T13:32:37.531Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3568
Vulnerability from cvelistv5
Published
2014-10-19 01:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:50:17.862Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "HPSBOV03227", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { name: "HPSBHF03300", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2", }, { name: "openSUSE-SU-2014:1331", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61130", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61130", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20141015.txt", }, { name: "62070", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62070", }, { name: "70585", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/70585", }, { name: "61073", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61073", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=26a59d9b46574e457870197dffa802871b4c8fc7", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "DSA-3053", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-3053", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT205217", }, { name: "SSRT101779", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "APPLE-SA-2015-09-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", }, { name: "SUSE-SU-2014:1357", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", }, { name: "openssl-cve20143568-sec-bypass(97037)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97037", }, { name: "NetBSD-SA2014-015", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/HT204244", }, { name: "SSRT101767", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61207", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61207", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "62124", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62124", }, { name: "59627", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59627", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "SUSE-SU-2014:1361", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61959", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "61058", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61058", }, { name: "62030", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62030", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "1031053", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031053", }, { name: "61819", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61819", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-10-15T00:00:00", descriptions: [ { lang: "en", value: "OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-14T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "HPSBOV03227", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { name: "HPSBHF03300", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2", }, { name: "openSUSE-SU-2014:1331", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61130", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61130", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20141015.txt", }, { name: "62070", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62070", }, { name: "70585", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/70585", }, { name: "61073", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61073", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=26a59d9b46574e457870197dffa802871b4c8fc7", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "DSA-3053", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-3053", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT205217", }, { name: "SSRT101779", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "APPLE-SA-2015-09-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", }, { name: "SUSE-SU-2014:1357", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", }, { name: "openssl-cve20143568-sec-bypass(97037)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97037", }, { name: "NetBSD-SA2014-015", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/HT204244", }, { name: "SSRT101767", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61207", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61207", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "62124", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62124", }, { name: "59627", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59627", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "SUSE-SU-2014:1361", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61959", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "61058", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61058", }, { name: "62030", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62030", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "1031053", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031053", }, { name: "61819", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61819", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3568", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "HPSBOV03227", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { name: "HPSBHF03300", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2", }, { name: "openSUSE-SU-2014:1331", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html", }, { name: "HPSBUX03162", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61130", refsource: "SECUNIA", url: "http://secunia.com/advisories/61130", }, { name: "https://www.openssl.org/news/secadv_20141015.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20141015.txt", }, { name: "62070", refsource: "SECUNIA", url: "http://secunia.com/advisories/62070", }, { name: "70585", refsource: "BID", url: "http://www.securityfocus.com/bid/70585", }, { name: "61073", refsource: "SECUNIA", url: "http://secunia.com/advisories/61073", }, { name: "HPSBMU03304", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=26a59d9b46574e457870197dffa802871b4c8fc7", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=26a59d9b46574e457870197dffa802871b4c8fc7", }, { name: "GLSA-201412-39", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "DSA-3053", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-3053", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03260", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "https://support.apple.com/HT205217", refsource: "CONFIRM", url: "https://support.apple.com/HT205217", }, { name: "SSRT101779", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142103967620673&w=2", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "APPLE-SA-2015-09-16-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", }, { name: "SUSE-SU-2014:1357", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", }, { name: "openssl-cve20143568-sec-bypass(97037)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/97037", }, { name: "NetBSD-SA2014-015", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc", }, { name: "http://support.apple.com/HT204244", refsource: "CONFIRM", url: "http://support.apple.com/HT204244", }, { name: "SSRT101767", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141477196830952&w=2", }, { name: "61207", refsource: "SECUNIA", url: "http://secunia.com/advisories/61207", }, { name: "SUSE-SU-2015:0578", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "62124", refsource: "SECUNIA", url: "http://secunia.com/advisories/62124", }, { name: "59627", refsource: "SECUNIA", url: "http://secunia.com/advisories/59627", }, { name: "SSRT101894", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "HPSBMU03263", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "SUSE-SU-2014:1361", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html", }, { name: "61959", refsource: "SECUNIA", url: "http://secunia.com/advisories/61959", }, { name: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", refsource: "CONFIRM", url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", }, { name: "HPSBMU03267", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "61058", refsource: "SECUNIA", url: "http://secunia.com/advisories/61058", }, { name: "62030", refsource: "SECUNIA", url: "http://secunia.com/advisories/62030", }, { name: "https://support.citrix.com/article/CTX216642", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX216642", }, { name: "APPLE-SA-2015-01-27-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "1031053", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1031053", }, { name: "61819", refsource: "SECUNIA", url: "http://secunia.com/advisories/61819", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3568", datePublished: "2014-10-19T01:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:50:17.862Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3505
Vulnerability from cvelistv5
Published
2014-08-13 23:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.486Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2014:1297", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1297.html", }, { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60778", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "RHSA-2014:1256", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1256.html", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61040", }, { name: "61250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61250", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bff1ce4e6a1c57c3d0a5f9e4f85ba6385fccfe8b", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60803", }, { name: "60824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60917", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60921", }, { name: "HPSBOV03099", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { name: "59221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59221", }, { name: "69081", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/69081", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61100", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59756", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58962", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60684", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "60687", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60687", }, { name: "MDVSA-2014:158", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-06T00:00:00", descriptions: [ { lang: "en", value: "Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-01-04T20:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2014:1297", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1297.html", }, { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60778", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "RHSA-2014:1256", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1256.html", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61040", }, { name: "61250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61250", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bff1ce4e6a1c57c3d0a5f9e4f85ba6385fccfe8b", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60803", }, { name: "60824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60917", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60921", }, { name: "HPSBOV03099", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { name: "59221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59221", }, { name: "69081", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/69081", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61100", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59756", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58962", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60684", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "60687", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60687", }, { name: "MDVSA-2014:158", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3505", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2014:1297", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1297.html", }, { name: "openSUSE-SU-2014:1052", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1052.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", refsource: "SECUNIA", url: "http://secunia.com/advisories/60221", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", refsource: "SECUNIA", url: "http://secunia.com/advisories/60778", }, { name: "61184", refsource: "SECUNIA", url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "RHSA-2014:1256", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1256.html", }, { name: "60022", refsource: "SECUNIA", url: "http://secunia.com/advisories/60022", }, { name: "https://www.openssl.org/news/secadv_20140806.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61040", refsource: "SECUNIA", url: "http://secunia.com/advisories/61040", }, { name: "61250", refsource: "SECUNIA", url: "http://secunia.com/advisories/61250", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bff1ce4e6a1c57c3d0a5f9e4f85ba6385fccfe8b", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bff1ce4e6a1c57c3d0a5f9e4f85ba6385fccfe8b", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "GLSA-201412-39", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60803", refsource: "SECUNIA", url: "http://secunia.com/advisories/60803", }, { name: "60824", refsource: "SECUNIA", url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", refsource: "SECUNIA", url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", refsource: "SECUNIA", url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "60917", refsource: "SECUNIA", url: "http://secunia.com/advisories/60917", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html", }, { name: "NetBSD-SA2014-008", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", refsource: "SECUNIA", url: "http://secunia.com/advisories/60493", }, { name: "59710", refsource: "SECUNIA", url: "http://secunia.com/advisories/59710", }, { name: "60921", refsource: "SECUNIA", url: "http://secunia.com/advisories/60921", }, { name: "HPSBOV03099", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { name: "59221", refsource: "SECUNIA", url: "http://secunia.com/advisories/59221", }, { name: "69081", refsource: "BID", url: "http://www.securityfocus.com/bid/69081", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", refsource: "SECUNIA", url: "http://secunia.com/advisories/61100", }, { name: "61775", refsource: "SECUNIA", url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", refsource: "SECUNIA", url: "http://secunia.com/advisories/61959", }, { name: "59756", refsource: "SECUNIA", url: "http://secunia.com/advisories/59756", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", refsource: "SECUNIA", url: "http://secunia.com/advisories/58962", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1053.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "60938", refsource: "SECUNIA", url: "http://secunia.com/advisories/60938", }, { name: "60684", refsource: "SECUNIA", url: "http://secunia.com/advisories/60684", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", refsource: "MLIST", url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "60687", refsource: "SECUNIA", url: "http://secunia.com/advisories/60687", }, { name: "MDVSA-2014:158", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3505", datePublished: "2014-08-13T23:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.486Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3512
Vulnerability from cvelistv5
Published
2014-08-13 23:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.360Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61017", }, { name: "openssl-cve20143512-dos(95158)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95158", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=4a23b12a031860253b58d503f296377ca076427b", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60803", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59700", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60917", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.tenable.com/security/tns-2014-06", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60921", }, { name: "60810", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60810", }, { name: "69083", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/69083", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59756", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "61171", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61171", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-06T00:00:00", descriptions: [ { lang: "en", value: "Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-28T12:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61017", }, { name: "openssl-cve20143512-dos(95158)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95158", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=4a23b12a031860253b58d503f296377ca076427b", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60803", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59700", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60917", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.tenable.com/security/tns-2014-06", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60921", }, { name: "60810", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60810", }, { name: "69083", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/69083", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59756", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "61171", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61171", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3512", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2014:1052", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "60221", refsource: "SECUNIA", url: "http://secunia.com/advisories/60221", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "61184", refsource: "SECUNIA", url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", refsource: "SECUNIA", url: "http://secunia.com/advisories/60022", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html", }, { name: "https://www.openssl.org/news/secadv_20140806.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", refsource: "SECUNIA", url: "http://secunia.com/advisories/61017", }, { name: "openssl-cve20143512-dos(95158)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95158", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=4a23b12a031860253b58d503f296377ca076427b", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=4a23b12a031860253b58d503f296377ca076427b", }, { name: "GLSA-201412-39", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60803", refsource: "SECUNIA", url: "http://secunia.com/advisories/60803", }, { name: "59700", refsource: "SECUNIA", url: "http://secunia.com/advisories/59700", }, { name: "1030693", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1030693", }, { name: "60917", refsource: "SECUNIA", url: "http://secunia.com/advisories/60917", }, { name: "http://www.tenable.com/security/tns-2014-06", refsource: "CONFIRM", url: "http://www.tenable.com/security/tns-2014-06", }, { name: "NetBSD-SA2014-008", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", refsource: "SECUNIA", url: "http://secunia.com/advisories/60493", }, { name: "59710", refsource: "SECUNIA", url: "http://secunia.com/advisories/59710", }, { name: "60921", refsource: "SECUNIA", url: "http://secunia.com/advisories/60921", }, { name: "60810", refsource: "SECUNIA", url: "http://secunia.com/advisories/60810", }, { name: "69083", refsource: "BID", url: "http://www.securityfocus.com/bid/69083", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", refsource: "SECUNIA", url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", refsource: "FREEBSD", url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", refsource: "SECUNIA", url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "61959", refsource: "SECUNIA", url: "http://secunia.com/advisories/61959", }, { name: "59756", refsource: "SECUNIA", url: "http://secunia.com/advisories/59756", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", refsource: "MLIST", url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "61171", refsource: "SECUNIA", url: "http://secunia.com/advisories/61171", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3512", datePublished: "2014-08-13T23:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.360Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3570
Vulnerability from cvelistv5
Published
2015-01-09 02:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:50:17.630Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "HPSBOV03318", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBGN03299", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT204659", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "RHSA-2015:0849", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0849.html", }, { name: "FEDORA-2015-0601", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "71939", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71939", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "HPSBUX03244", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "RHSA-2016:1650", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1650.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "SSRT101987", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SSRT101885", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "FEDORA-2015-0512", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-01-08T00:00:00", descriptions: [ { lang: "en", value: "The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-14T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "HPSBOV03318", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBGN03299", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT204659", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "RHSA-2015:0849", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0849.html", }, { name: "FEDORA-2015-0601", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "71939", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71939", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "HPSBUX03244", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "RHSA-2016:1650", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1650.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "SSRT101987", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SSRT101885", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "FEDORA-2015-0512", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3570", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "HPSBOV03318", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBGN03299", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "HPSBMU03409", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "https://support.apple.com/HT204659", refsource: "CONFIRM", url: "https://support.apple.com/HT204659", }, { name: "https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0", refsource: "CONFIRM", url: "https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "RHSA-2015:0849", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0849.html", }, { name: "FEDORA-2015-0601", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "https://www.openssl.org/news/secadv_20150108.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "71939", refsource: "BID", url: "http://www.securityfocus.com/bid/71939", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "RHSA-2015:0066", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "HPSBUX03244", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "RHSA-2016:1650", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1650.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "SSRT101987", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "https://support.citrix.com/article/CTX216642", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SSRT101885", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "https://bto.bluecoat.com/security-advisory/sa88", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "FEDORA-2015-0512", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3570", datePublished: "2015-01-09T02:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:50:17.630Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-0206
Vulnerability from cvelistv5
Published
2015-01-09 02:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:03:10.413Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "openssl-cve20150206-dos(99704)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/99704", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "FEDORA-2015-0601", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/openssl/openssl/commit/103b171d8fc282ef435f8de9afbf7782e312961f", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "91787", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "71940", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71940", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "FEDORA-2015-0512", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-01-08T00:00:00", descriptions: [ { lang: "en", value: "Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-19T16:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "openssl-cve20150206-dos(99704)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/99704", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "FEDORA-2015-0601", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/openssl/openssl/commit/103b171d8fc282ef435f8de9afbf7782e312961f", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "91787", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "71940", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71940", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "FEDORA-2015-0512", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2015-0206", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "openssl-cve20150206-dos(99704)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/99704", }, { name: "HPSBMU03409", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "FEDORA-2015-0601", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", }, { name: "1033378", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "https://www.openssl.org/news/secadv_20150108.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "RHSA-2015:0066", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "https://github.com/openssl/openssl/commit/103b171d8fc282ef435f8de9afbf7782e312961f", refsource: "CONFIRM", url: "https://github.com/openssl/openssl/commit/103b171d8fc282ef435f8de9afbf7782e312961f", }, { name: "SUSE-SU-2015:0946", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "91787", refsource: "BID", url: "http://www.securityfocus.com/bid/91787", }, { name: "71940", refsource: "BID", url: "http://www.securityfocus.com/bid/71940", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "HPSBMU03413", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "https://bto.bluecoat.com/security-advisory/sa88", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3125", }, { name: "FEDORA-2015-0512", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-0206", datePublished: "2015-01-09T02:00:00", dateReserved: "2014-11-18T00:00:00", dateUpdated: "2024-08-06T04:03:10.413Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3509
Vulnerability from cvelistv5
Published
2014-08-13 23:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.466Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127498", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61017", }, { name: "RHSA-2015:0197", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0197.html", }, { name: "SSRT101818", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "69084", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/69084", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=fb0bc2b273bcc2d5401dd883fe869af4fc74bb21", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60803", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1030693", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60917", }, { name: "HPSBMU03216", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60921", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61775", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "openssl-cve20143509-dos(95159)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95159", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59756", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58962", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60684", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://techzone.ergon.ch/CVE-2014-3511", }, { name: "MDVSA-2014:158", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "61139", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61139", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-06T00:00:00", descriptions: [ { lang: "en", value: "Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-14T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127498", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61017", }, { name: "RHSA-2015:0197", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0197.html", }, { name: "SSRT101818", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "69084", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/69084", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=fb0bc2b273bcc2d5401dd883fe869af4fc74bb21", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60803", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1030693", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60917", }, { name: "HPSBMU03216", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60921", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61775", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "openssl-cve20143509-dos(95159)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95159", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59756", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58962", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60684", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://techzone.ergon.ch/CVE-2014-3511", }, { name: "MDVSA-2014:158", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "61139", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61139", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3509", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2014:1052", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1127498", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127498", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1052.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", refsource: "SECUNIA", url: "http://secunia.com/advisories/60221", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "61184", refsource: "SECUNIA", url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", refsource: "SECUNIA", url: "http://secunia.com/advisories/60022", }, { name: "https://www.openssl.org/news/secadv_20140806.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", refsource: "SECUNIA", url: "http://secunia.com/advisories/61017", }, { name: "RHSA-2015:0197", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0197.html", }, { name: "SSRT101818", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "HPSBMU03304", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "69084", refsource: "BID", url: "http://www.securityfocus.com/bid/69084", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=fb0bc2b273bcc2d5401dd883fe869af4fc74bb21", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=fb0bc2b273bcc2d5401dd883fe869af4fc74bb21", }, { name: "GLSA-201412-39", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03260", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "60803", refsource: "SECUNIA", url: "http://secunia.com/advisories/60803", }, { name: "59700", refsource: "SECUNIA", url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1030693", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "60917", refsource: "SECUNIA", url: "http://secunia.com/advisories/60917", }, { name: "HPSBMU03216", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "NetBSD-SA2014-008", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", refsource: "SECUNIA", url: "http://secunia.com/advisories/60493", }, { name: "59710", refsource: "SECUNIA", url: "http://secunia.com/advisories/59710", }, { name: "60921", refsource: "SECUNIA", url: "http://secunia.com/advisories/60921", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", refsource: "SECUNIA", url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", refsource: "FREEBSD", url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", refsource: "SECUNIA", url: "http://secunia.com/advisories/61775", }, { name: "SSRT101894", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "DSA-2998", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "HPSBMU03263", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "openssl-cve20143509-dos(95159)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95159", }, { name: "61959", refsource: "SECUNIA", url: "http://secunia.com/advisories/61959", }, { name: "59756", refsource: "SECUNIA", url: "http://secunia.com/advisories/59756", }, { name: "HPSBMU03267", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", refsource: "SECUNIA", url: "http://secunia.com/advisories/58962", }, { name: "60938", refsource: "SECUNIA", url: "http://secunia.com/advisories/60938", }, { name: "60684", refsource: "SECUNIA", url: "http://secunia.com/advisories/60684", }, { name: "https://support.citrix.com/article/CTX216642", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX216642", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", refsource: "MLIST", url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "https://techzone.ergon.ch/CVE-2014-3511", refsource: "CONFIRM", url: "https://techzone.ergon.ch/CVE-2014-3511", }, { name: "MDVSA-2014:158", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "61139", refsource: "SECUNIA", url: "http://secunia.com/advisories/61139", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3509", datePublished: "2014-08-13T23:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.466Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3572
Vulnerability from cvelistv5
Published
2015-01-09 02:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:50:17.438Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "HPSBOV03318", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBGN03299", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT204659", }, { name: "71942", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/71942", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "HPSBUX03244", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "SSRT101987", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SSRT101885", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3125", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-01-08T00:00:00", descriptions: [ { lang: "en", value: "The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-14T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "HPSBOV03318", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBGN03299", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT204659", }, { name: "71942", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/71942", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63", }, { name: "1033378", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "RHSA-2015:0066", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "HPSBUX03244", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "SSRT101987", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SSRT101885", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3125", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3572", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "HPSBOV03318", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142895206924048&w=2", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "openSUSE-SU-2015:0130", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", }, { name: "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", }, { name: "HPSBGN03299", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "HPSBMU03409", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "https://support.apple.com/HT204659", refsource: "CONFIRM", url: "https://support.apple.com/HT204659", }, { name: "71942", refsource: "BID", url: "http://www.securityfocus.com/bid/71942", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { name: "https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63", refsource: "CONFIRM", url: "https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63", }, { name: "1033378", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1033378", }, { name: "HPSBHF03289", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "https://www.openssl.org/news/secadv_20150108.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20150108.txt", }, { name: "MDVSA-2015:019", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "RHSA-2015:0066", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-0066.html", }, { name: "HPSBUX03244", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "APPLE-SA-2015-04-08-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", }, { name: "SUSE-SU-2015:0578", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", }, { name: "SUSE-SU-2015:0946", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", }, { name: "HPSBMU03397", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "HPSBMU03396", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050205101530&w=2", }, { name: "HPSBUX03162", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496179803395&w=2", }, { name: "SSRT101987", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142720981827617&w=2", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "https://support.citrix.com/article/CTX216642", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX216642", }, { name: "HPSBMU03413", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "SSRT101885", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142496289803847&w=2", }, { name: "https://bto.bluecoat.com/security-advisory/sa88", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa88", }, { name: "DSA-3125", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3125", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3572", datePublished: "2015-01-09T02:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:50:17.438Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3510
Vulnerability from cvelistv5
Published
2014-08-13 23:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.162Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2014:1297", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1297.html", }, { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60778", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "RHSA-2014:1256", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1256.html", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61017", }, { name: "61250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61250", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "openssl-cve20143510-dos(95164)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95164", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "61045", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61045", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60803", }, { name: "60824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60917", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60921", }, { name: "HPSBOV03099", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=17160033765480453be0a41335fa6b833691c049", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15568.html", }, { name: "59221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59221", }, { name: "69082", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/69082", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59756", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58962", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60684", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "60687", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60687", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127503", }, { name: "MDVSA-2014:158", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-06T00:00:00", descriptions: [ { lang: "en", value: "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-28T12:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2014:1297", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1297.html", }, { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60778", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "RHSA-2014:1256", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1256.html", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61017", }, { name: "61250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61250", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "openssl-cve20143510-dos(95164)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95164", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "61045", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61045", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60803", }, { name: "60824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60917", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60921", }, { name: "HPSBOV03099", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=17160033765480453be0a41335fa6b833691c049", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15568.html", }, { name: "59221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59221", }, { name: "69082", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/69082", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59756", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58962", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60684", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "60687", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60687", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127503", }, { name: "MDVSA-2014:158", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3510", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2014:1297", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1297.html", }, { name: "openSUSE-SU-2014:1052", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1052.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", refsource: "SECUNIA", url: "http://secunia.com/advisories/60221", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", refsource: "SECUNIA", url: "http://secunia.com/advisories/60778", }, { name: "61184", refsource: "SECUNIA", url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "RHSA-2014:1256", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1256.html", }, { name: "60022", refsource: "SECUNIA", url: "http://secunia.com/advisories/60022", }, { name: "https://www.openssl.org/news/secadv_20140806.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", refsource: "SECUNIA", url: "http://secunia.com/advisories/61017", }, { name: "61250", refsource: "SECUNIA", url: "http://secunia.com/advisories/61250", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "openssl-cve20143510-dos(95164)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95164", }, { name: "GLSA-201412-39", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "61045", refsource: "SECUNIA", url: "http://secunia.com/advisories/61045", }, { name: "60803", refsource: "SECUNIA", url: "http://secunia.com/advisories/60803", }, { name: "60824", refsource: "SECUNIA", url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", refsource: "SECUNIA", url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", refsource: "SECUNIA", url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "60917", refsource: "SECUNIA", url: "http://secunia.com/advisories/60917", }, { name: "NetBSD-SA2014-008", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", refsource: "SECUNIA", url: "http://secunia.com/advisories/60493", }, { name: "59710", refsource: "SECUNIA", url: "http://secunia.com/advisories/59710", }, { name: "60921", refsource: "SECUNIA", url: "http://secunia.com/advisories/60921", }, { name: "HPSBOV03099", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=17160033765480453be0a41335fa6b833691c049", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=17160033765480453be0a41335fa6b833691c049", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15568.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15568.html", }, { name: "59221", refsource: "SECUNIA", url: "http://secunia.com/advisories/59221", }, { name: "69082", refsource: "BID", url: "http://www.securityfocus.com/bid/69082", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", refsource: "SECUNIA", url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", refsource: "FREEBSD", url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", refsource: "SECUNIA", url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", refsource: "SECUNIA", url: "http://secunia.com/advisories/61959", }, { name: "59756", refsource: "SECUNIA", url: "http://secunia.com/advisories/59756", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", refsource: "SECUNIA", url: "http://secunia.com/advisories/58962", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1053.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "60938", refsource: "SECUNIA", url: "http://secunia.com/advisories/60938", }, { name: "60684", refsource: "SECUNIA", url: "http://secunia.com/advisories/60684", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", refsource: "MLIST", url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "60687", refsource: "SECUNIA", url: "http://secunia.com/advisories/60687", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1127503", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127503", }, { name: "MDVSA-2014:158", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3510", datePublished: "2014-08-13T23:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.162Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-0288
Vulnerability from cvelistv5
Published
2015-03-19 00:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:03:10.738Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { name: "openSUSE-SU-2015:0554", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "DSA-3197", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3197", }, { name: "USN-2537-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa92", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150319.txt", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { tags: [ "x_transferred", ], url: "https://rt.openssl.org/Ticket/Display.html?id=3708&user=guest&pass=guest", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "FEDORA-2015-6951", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_transferred", ], url: "https://access.redhat.com/articles/1384453", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "73237", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/73237", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "SUSE-SU-2015:0541", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { name: "HPSBGN03306", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2", }, { tags: [ "x_transferred", ], url: "http://support.apple.com/kb/HT204942", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "FreeBSD-SA-15:06", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202418", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "1031929", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "FEDORA-2015-6855", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201503-11", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=28a00bcd8e318da18031b2ac8778c64147cd54f9", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-03-19T00:00:00", descriptions: [ { lang: "en", value: "The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { name: "openSUSE-SU-2015:0554", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "DSA-3197", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3197", }, { name: "USN-2537-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa92", }, { url: "https://www.openssl.org/news/secadv_20150319.txt", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { url: "https://rt.openssl.org/Ticket/Display.html?id=3708&user=guest&pass=guest", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "FEDORA-2015-6951", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { url: "https://access.redhat.com/articles/1384453", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "73237", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/73237", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "SUSE-SU-2015:0541", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { name: "HPSBGN03306", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2", }, { url: "http://support.apple.com/kb/HT204942", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "FreeBSD-SA-15:06", tags: [ "vendor-advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202418", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "1031929", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { url: "https://support.citrix.com/article/CTX216642", }, { name: "FEDORA-2015-6855", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { name: "HPSBMU03413", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050254401665&w=2", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201503-11", }, { url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=28a00bcd8e318da18031b2ac8778c64147cd54f9", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-0288", datePublished: "2015-03-19T00:00:00", dateReserved: "2014-11-18T00:00:00", dateUpdated: "2024-08-06T04:03:10.738Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3508
Vulnerability from cvelistv5
Published
2014-08-13 23:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.460Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2014:1297", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1297.html", }, { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "HPSBGN03099", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140973896703549&w=2", }, { name: "61214", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61214", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60778", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61184", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_3508_information_disclosure", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "RHSA-2014:1256", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1256.html", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61017", }, { name: "61250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61250", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "69075", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/69075", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15571.html", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "60410", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60410", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60803", }, { name: "60824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "60861", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60861", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21681752", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60917", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.tenable.com/security/tns-2014-06", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60921", }, { name: "HPSBOV03099", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { name: "59221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59221", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61100", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61775", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59756", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58962", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "61392", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61392", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60684", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127490", }, { name: "openssl-cve20143508-info-disc(95165)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95165", }, { name: "61171", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61171", }, { name: "60687", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60687", }, { name: "MDVSA-2014:158", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-06T00:00:00", descriptions: [ { lang: "en", value: "The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-14T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2014:1297", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1297.html", }, { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "HPSBGN03099", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140973896703549&w=2", }, { name: "61214", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61214", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60778", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61184", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_3508_information_disclosure", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "RHSA-2014:1256", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1256.html", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61017", }, { name: "61250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61250", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "69075", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/69075", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15571.html", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "60410", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60410", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60803", }, { name: "60824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "60861", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60861", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21681752", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60917", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.tenable.com/security/tns-2014-06", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60921", }, { name: "HPSBOV03099", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { name: "59221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59221", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61100", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61775", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59756", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58962", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "61392", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61392", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60684", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127490", }, { name: "openssl-cve20143508-info-disc(95165)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95165", }, { name: "61171", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61171", }, { name: "60687", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60687", }, { name: "MDVSA-2014:158", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3508", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2014:1297", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1297.html", }, { name: "openSUSE-SU-2014:1052", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "HPSBGN03099", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140973896703549&w=2", }, { name: "61214", refsource: "SECUNIA", url: "http://secunia.com/advisories/61214", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1052.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", refsource: "SECUNIA", url: "http://secunia.com/advisories/60221", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", refsource: "SECUNIA", url: "http://secunia.com/advisories/60778", }, { name: "61184", refsource: "SECUNIA", url: "http://secunia.com/advisories/61184", }, { name: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_3508_information_disclosure", refsource: "CONFIRM", url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_3508_information_disclosure", }, { name: "SSRT101846", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "RHSA-2014:1256", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1256.html", }, { name: "60022", refsource: "SECUNIA", url: "http://secunia.com/advisories/60022", }, { name: "https://www.openssl.org/news/secadv_20140806.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61017", refsource: "SECUNIA", url: "http://secunia.com/advisories/61017", }, { name: "61250", refsource: "SECUNIA", url: "http://secunia.com/advisories/61250", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "69075", refsource: "BID", url: "http://www.securityfocus.com/bid/69075", }, { name: "HPSBMU03304", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15571.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15571.html", }, { name: "HPSBHF03293", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "60410", refsource: "SECUNIA", url: "http://secunia.com/advisories/60410", }, { name: "HPSBMU03260", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "60803", refsource: "SECUNIA", url: "http://secunia.com/advisories/60803", }, { name: "60824", refsource: "SECUNIA", url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", refsource: "SECUNIA", url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", refsource: "SECUNIA", url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "60861", refsource: "SECUNIA", url: "http://secunia.com/advisories/60861", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21681752", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21681752", }, { name: "60917", refsource: "SECUNIA", url: "http://secunia.com/advisories/60917", }, { name: "http://www.tenable.com/security/tns-2014-06", refsource: "CONFIRM", url: "http://www.tenable.com/security/tns-2014-06", }, { name: "NetBSD-SA2014-008", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", refsource: "SECUNIA", url: "http://secunia.com/advisories/60493", }, { name: "59710", refsource: "SECUNIA", url: "http://secunia.com/advisories/59710", }, { name: "60921", refsource: "SECUNIA", url: "http://secunia.com/advisories/60921", }, { name: "HPSBOV03099", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { name: "59221", refsource: "SECUNIA", url: "http://secunia.com/advisories/59221", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "61100", refsource: "SECUNIA", url: "http://secunia.com/advisories/61100", }, { name: "SUSE-SU-2015:0578", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "FreeBSD-SA-14:18", refsource: "FREEBSD", url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", refsource: "SECUNIA", url: "http://secunia.com/advisories/61775", }, { name: "SSRT101894", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "DSA-2998", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "HPSBMU03263", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", refsource: "SECUNIA", url: "http://secunia.com/advisories/61959", }, { name: "59756", refsource: "SECUNIA", url: "http://secunia.com/advisories/59756", }, { name: "HPSBMU03267", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", refsource: "SECUNIA", url: "http://secunia.com/advisories/58962", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1053.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "61392", refsource: "SECUNIA", url: "http://secunia.com/advisories/61392", }, { name: "60938", refsource: "SECUNIA", url: "http://secunia.com/advisories/60938", }, { name: "60684", refsource: "SECUNIA", url: "http://secunia.com/advisories/60684", }, { name: "https://support.citrix.com/article/CTX216642", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX216642", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", refsource: "MLIST", url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1127490", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127490", }, { name: "openssl-cve20143508-info-disc(95165)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95165", }, { name: "61171", refsource: "SECUNIA", url: "http://secunia.com/advisories/61171", }, { name: "60687", refsource: "SECUNIA", url: "http://secunia.com/advisories/60687", }, { name: "MDVSA-2014:158", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3508", datePublished: "2014-08-13T23:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.460Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-0292
Vulnerability from cvelistv5
Published
2015-03-19 00:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:03:10.891Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "DSA-3197", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3197", }, { name: "USN-2537-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa92", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150319.txt", }, { tags: [ "x_transferred", ], url: "https://rt.openssl.org/Ticket/Display.html?id=2608&user=guest&pass=guest", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202395", }, { tags: [ "x_transferred", ], url: "https://access.redhat.com/articles/1384453", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "73228", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/73228", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=d0666f289ac013094bbbf547bfbcd616199b7d2d", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "1031929", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201503-11", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2011-09-23T00:00:00", descriptions: [ { lang: "en", value: "Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "DSA-3197", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3197", }, { name: "USN-2537-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa92", }, { url: "https://www.openssl.org/news/secadv_20150319.txt", }, { url: "https://rt.openssl.org/Ticket/Display.html?id=2608&user=guest&pass=guest", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202395", }, { url: "https://access.redhat.com/articles/1384453", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "73228", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/73228", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { url: "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=d0666f289ac013094bbbf547bfbcd616199b7d2d", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "1031929", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { url: "https://support.citrix.com/article/CTX216642", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201503-11", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-0292", datePublished: "2015-03-19T00:00:00", dateReserved: "2014-11-18T00:00:00", dateUpdated: "2024-08-06T04:03:10.891Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-0195
Vulnerability from cvelistv5
Published
2014-06-05 21:00
Modified
2024-08-06 09:05
Severity ?
EPSS score ?
Summary
The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T09:05:39.286Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59669", }, { name: "59530", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59530", }, { name: "59990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59990", }, { name: "1030337", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1030337", }, { name: "59454", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59454", }, { name: "59188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59188", }, { name: "59126", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59126", }, { name: "59306", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59306", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "HPSBUX03046", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "61254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61254", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103598", }, { name: "59223", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59223", }, { name: "59895", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59895", }, { name: "58743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58743", }, { name: "59449", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59449", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59189", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59189", }, { name: "MDVSA-2014:106", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59300", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59365", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "59305", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59305", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58945", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "58883", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58883", }, { name: "59659", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59659", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "59429", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59429", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59655", }, { name: "58660", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58660", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "67900", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/67900", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "59310", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59310", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.citrix.com/article/CTX140876", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1632ef744872edc2aa2a53d487d3e79c965a4ad3", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "HPSBMU03069", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140499827729550&w=2", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59514", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/ZDI-14-173-CVE-2014-0195-OpenSSL-DTLS-Fragment-Out-of-Bounds/ba-p/6501002", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "58714", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58615", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15356.html", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT6443", }, { name: "59587", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59587", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59301", }, { name: "59784", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59784", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "59192", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "59040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59040", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59175", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59413", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59721", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Once-Bled-Twice-Shy-OpenSSL-CVE-2014-0195/ba-p/6501048", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59450", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59491", }, { name: "59364", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59364", }, { name: "59451", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59451", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58977", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "60571", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60571", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.blackberry.com/btsc/KB36051", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "59528", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59528", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58337", }, { name: "59518", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59518", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59162", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59490", }, { name: "HPSBMU03065", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-06-05T00:00:00", descriptions: [ { lang: "en", value: "The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-09T18:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59669", }, { name: "59530", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59530", }, { name: "59990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59990", }, { name: "1030337", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1030337", }, { name: "59454", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59454", }, { name: "59188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59188", }, { name: "59126", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59126", }, { name: "59306", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59306", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "HPSBUX03046", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "61254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61254", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103598", }, { name: "59223", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59223", }, { name: "59895", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59895", }, { name: "58743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58743", }, { name: "59449", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59449", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59189", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59189", }, { name: "MDVSA-2014:106", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59300", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59365", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "59305", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59305", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58945", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "58883", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58883", }, { name: "59659", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59659", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "59429", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59429", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59655", }, { name: "58660", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58660", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "67900", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/67900", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "59310", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59310", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.citrix.com/article/CTX140876", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1632ef744872edc2aa2a53d487d3e79c965a4ad3", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "HPSBMU03069", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140499827729550&w=2", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59514", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_MISC", ], url: "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/ZDI-14-173-CVE-2014-0195-OpenSSL-DTLS-Fragment-Out-of-Bounds/ba-p/6501002", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "58714", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58615", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15356.html", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT6443", }, { name: "59587", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59587", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59301", }, { name: "59784", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59784", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "59192", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "59040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59040", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59175", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59413", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59721", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { tags: [ "x_refsource_MISC", ], url: "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Once-Bled-Twice-Shy-OpenSSL-CVE-2014-0195/ba-p/6501048", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59450", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59491", }, { name: "59364", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59364", }, { name: "59451", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59451", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58977", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "60571", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60571", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.blackberry.com/btsc/KB36051", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "59528", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59528", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58337", }, { name: "59518", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59518", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59162", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59490", }, { name: "HPSBMU03065", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-0195", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "59342", refsource: "SECUNIA", url: "http://secunia.com/advisories/59342", }, { name: "59669", refsource: "SECUNIA", url: "http://secunia.com/advisories/59669", }, { name: "59530", refsource: "SECUNIA", url: "http://secunia.com/advisories/59530", }, { name: "59990", refsource: "SECUNIA", url: "http://secunia.com/advisories/59990", }, { name: "1030337", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1030337", }, { name: "59454", refsource: "SECUNIA", url: "http://secunia.com/advisories/59454", }, { name: "59188", refsource: "SECUNIA", url: "http://secunia.com/advisories/59188", }, { name: "59126", refsource: "SECUNIA", url: "http://secunia.com/advisories/59126", }, { name: "59306", refsource: "SECUNIA", url: "http://secunia.com/advisories/59306", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "SSRT101846", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "HPSBUX03046", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "61254", refsource: "SECUNIA", url: "http://secunia.com/advisories/61254", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1103598", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103598", }, { name: "59223", refsource: "SECUNIA", url: "http://secunia.com/advisories/59223", }, { name: "59895", refsource: "SECUNIA", url: "http://secunia.com/advisories/59895", }, { name: "58743", refsource: "SECUNIA", url: "http://secunia.com/advisories/58743", }, { name: "59449", refsource: "SECUNIA", url: "http://secunia.com/advisories/59449", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", refsource: "SECUNIA", url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59189", refsource: "SECUNIA", url: "http://secunia.com/advisories/59189", }, { name: "MDVSA-2014:106", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "59300", refsource: "SECUNIA", url: "http://secunia.com/advisories/59300", }, { name: "GLSA-201407-05", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "HPSBHF03293", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg24037783", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", refsource: "SECUNIA", url: "http://secunia.com/advisories/59365", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "59305", refsource: "SECUNIA", url: "http://secunia.com/advisories/59305", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", refsource: "SECUNIA", url: "http://secunia.com/advisories/58945", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "58883", refsource: "SECUNIA", url: "http://secunia.com/advisories/58883", }, { name: "59659", refsource: "SECUNIA", url: "http://secunia.com/advisories/59659", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "59429", refsource: "SECUNIA", url: "http://secunia.com/advisories/59429", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", refsource: "SECUNIA", url: "http://secunia.com/advisories/59655", }, { name: "58660", refsource: "SECUNIA", url: "http://secunia.com/advisories/58660", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { name: "59437", refsource: "SECUNIA", url: "http://secunia.com/advisories/59437", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "67900", refsource: "BID", url: "http://www.securityfocus.com/bid/67900", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "59310", refsource: "SECUNIA", url: "http://secunia.com/advisories/59310", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { name: "http://www.fortiguard.com/advisory/FG-IR-14-018/", refsource: "CONFIRM", url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676793", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676356", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { name: "http://support.citrix.com/article/CTX140876", refsource: "CONFIRM", url: "http://support.citrix.com/article/CTX140876", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1632ef744872edc2aa2a53d487d3e79c965a4ad3", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1632ef744872edc2aa2a53d487d3e79c965a4ad3", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "HPSBMU03069", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140499827729550&w=2", }, { name: "58939", refsource: "SECUNIA", url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59514", refsource: "SECUNIA", url: "http://secunia.com/advisories/59514", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { name: "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/ZDI-14-173-CVE-2014-0195-OpenSSL-DTLS-Fragment-Out-of-Bounds/ba-p/6501002", refsource: "MISC", url: "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/ZDI-14-173-CVE-2014-0195-OpenSSL-DTLS-Fragment-Out-of-Bounds/ba-p/6501002", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "58714", refsource: "SECUNIA", url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { name: "http://www.openssl.org/news/secadv_20140605.txt", refsource: "CONFIRM", url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", refsource: "SECUNIA", url: "http://secunia.com/advisories/58615", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15356.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15356.html", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", }, { name: "http://support.apple.com/kb/HT6443", refsource: "CONFIRM", url: "http://support.apple.com/kb/HT6443", }, { name: "59587", refsource: "SECUNIA", url: "http://secunia.com/advisories/59587", }, { name: "59301", refsource: "SECUNIA", url: "http://secunia.com/advisories/59301", }, { name: "59784", refsource: "SECUNIA", url: "http://secunia.com/advisories/59784", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA80", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { name: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", refsource: "CONFIRM", url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "59192", refsource: "SECUNIA", url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "59040", refsource: "SECUNIA", url: "http://secunia.com/advisories/59040", }, { name: "HPSBMU03056", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", refsource: "SECUNIA", url: "http://secunia.com/advisories/59175", }, { name: "HPSBMU03051", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", refsource: "SECUNIA", url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", refsource: "SECUNIA", url: "http://secunia.com/advisories/59413", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { name: "59721", refsource: "SECUNIA", url: "http://secunia.com/advisories/59721", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Once-Bled-Twice-Shy-OpenSSL-CVE-2014-0195/ba-p/6501048", refsource: "MISC", url: "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Once-Bled-Twice-Shy-OpenSSL-CVE-2014-0195/ba-p/6501048", }, { name: "58713", refsource: "SECUNIA", url: "http://secunia.com/advisories/58713", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", refsource: "SECUNIA", url: "http://secunia.com/advisories/59450", }, { name: "59287", refsource: "SECUNIA", url: "http://secunia.com/advisories/59287", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", refsource: "SECUNIA", url: "http://secunia.com/advisories/59491", }, { name: "59364", refsource: "SECUNIA", url: "http://secunia.com/advisories/59364", }, { name: "59451", refsource: "SECUNIA", url: "http://secunia.com/advisories/59451", }, { name: "58977", refsource: "SECUNIA", url: "http://secunia.com/advisories/58977", }, { name: "https://www.novell.com/support/kb/doc.php?id=7015271", refsource: "CONFIRM", url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "60571", refsource: "SECUNIA", url: "http://secunia.com/advisories/60571", }, { name: "http://www.blackberry.com/btsc/KB36051", refsource: "CONFIRM", url: "http://www.blackberry.com/btsc/KB36051", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "59528", refsource: "SECUNIA", url: "http://secunia.com/advisories/59528", }, { name: "58337", refsource: "SECUNIA", url: "http://secunia.com/advisories/58337", }, { name: "59518", refsource: "SECUNIA", url: "http://secunia.com/advisories/59518", }, { name: "59162", refsource: "SECUNIA", url: "http://secunia.com/advisories/59162", }, { name: "59490", refsource: "SECUNIA", url: "http://secunia.com/advisories/59490", }, { name: "HPSBMU03065", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-0195", datePublished: "2014-06-05T21:00:00", dateReserved: "2013-12-03T00:00:00", dateUpdated: "2024-08-06T09:05:39.286Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3513
Vulnerability from cvelistv5
Published
2014-10-19 01:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.447Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", }, { name: "HPSBHF03300", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2", }, { name: "openSUSE-SU-2014:1331", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20141015.txt", }, { name: "1031052", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031052", }, { name: "62070", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62070", }, { name: "61073", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61073", }, { name: "USN-2385-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2385-1", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "DSA-3053", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-3053", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03223", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290583027876&w=2", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT205217", }, { name: "70584", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/70584", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "APPLE-SA-2015-09-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", }, { name: "SUSE-SU-2014:1357", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", }, { name: "NetBSD-SA2014-015", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2b0532f3984324ebe1236a63d15893792384328d", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html", }, { name: "61837", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61837", }, { name: "61207", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61207", }, { name: "RHSA-2014:1652", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1652.html", }, { name: "59627", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59627", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "61298", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61298", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "HPSBMU03296", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142834685803386&w=2", }, { name: "61990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61990", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61959", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2014-0416.html", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "61058", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61058", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61439", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61439", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "RHSA-2014:1692", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1692.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-10-15T00:00:00", descriptions: [ { lang: "en", value: "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-30T16:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", }, { name: "HPSBHF03300", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2", }, { name: "openSUSE-SU-2014:1331", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20141015.txt", }, { name: "1031052", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031052", }, { name: "62070", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62070", }, { name: "61073", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61073", }, { name: "USN-2385-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2385-1", }, { name: "HPSBMU03304", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "DSA-3053", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-3053", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03223", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290583027876&w=2", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "HPSBMU03260", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT205217", }, { name: "70584", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/70584", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "APPLE-SA-2015-09-16-2", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", }, { name: "SUSE-SU-2014:1357", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", }, { name: "NetBSD-SA2014-015", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2b0532f3984324ebe1236a63d15893792384328d", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html", }, { name: "61837", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61837", }, { name: "61207", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61207", }, { name: "RHSA-2014:1652", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1652.html", }, { name: "59627", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59627", }, { name: "SSRT101894", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "61298", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61298", }, { name: "HPSBMU03263", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "HPSBMU03296", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142834685803386&w=2", }, { name: "61990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61990", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61959", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2014-0416.html", }, { name: "HPSBMU03267", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "61058", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61058", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61439", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61439", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "RHSA-2014:1692", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1692.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3513", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", }, { name: "HPSBHF03300", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142804214608580&w=2", }, { name: "openSUSE-SU-2014:1331", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html", }, { name: "https://www.openssl.org/news/secadv_20141015.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20141015.txt", }, { name: "1031052", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1031052", }, { name: "62070", refsource: "SECUNIA", url: "http://secunia.com/advisories/62070", }, { name: "61073", refsource: "SECUNIA", url: "http://secunia.com/advisories/61073", }, { name: "USN-2385-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2385-1", }, { name: "HPSBMU03304", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142791032306609&w=2", }, { name: "GLSA-201412-39", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "DSA-3053", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-3053", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "HPSBMU03223", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290583027876&w=2", }, { name: "SSRT101868", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "HPSBMU03260", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "https://support.apple.com/HT205217", refsource: "CONFIRM", url: "https://support.apple.com/HT205217", }, { name: "70584", refsource: "BID", url: "http://www.securityfocus.com/bid/70584", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { name: "APPLE-SA-2015-09-16-2", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", }, { name: "SUSE-SU-2014:1357", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10091", }, { name: "NetBSD-SA2014-015", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d", }, { name: "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html", refsource: "CONFIRM", url: "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html", }, { name: "61837", refsource: "SECUNIA", url: "http://secunia.com/advisories/61837", }, { name: "61207", refsource: "SECUNIA", url: "http://secunia.com/advisories/61207", }, { name: "RHSA-2014:1652", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1652.html", }, { name: "59627", refsource: "SECUNIA", url: "http://secunia.com/advisories/59627", }, { name: "SSRT101894", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142495837901899&w=2", }, { name: "61298", refsource: "SECUNIA", url: "http://secunia.com/advisories/61298", }, { name: "HPSBMU03263", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290437727362&w=2", }, { name: "HPSBMU03296", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142834685803386&w=2", }, { name: "61990", refsource: "SECUNIA", url: "http://secunia.com/advisories/61990", }, { name: "61959", refsource: "SECUNIA", url: "http://secunia.com/advisories/61959", }, { name: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", refsource: "CONFIRM", url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", }, { name: "http://advisories.mageia.org/MGASA-2014-0416.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2014-0416.html", }, { name: "HPSBMU03267", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142624590206005&w=2", }, { name: "HPSBMU03261", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=143290522027658&w=2", }, { name: "61058", refsource: "SECUNIA", url: "http://secunia.com/advisories/61058", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "HPSBGN03233", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61439", refsource: "SECUNIA", url: "http://secunia.com/advisories/61439", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "RHSA-2014:1692", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1692.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3513", datePublished: "2014-10-19T01:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.447Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-3507
Vulnerability from cvelistv5
Published
2014-08-13 23:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:43:06.463Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60778", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61040", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61017", }, { name: "61250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61250", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10109", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60803", }, { name: "60824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60917", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60921", }, { name: "openssl-cve20143507-dos(95161)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95161", }, { name: "HPSBOV03099", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "69078", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/69078", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59756", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58962", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60684", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=d0a4b7d1a2948fce38515b8d862f43e7ba0ebf74", }, { name: "MDVSA-2014:158", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127502", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-06T00:00:00", descriptions: [ { lang: "en", value: "Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-28T12:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "openSUSE-SU-2014:1052", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60221", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60778", }, { name: "61184", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60022", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61040", }, { name: "61017", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61017", }, { name: "61250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61250", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10109", }, { name: "GLSA-201412-39", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60803", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60803", }, { name: "60824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "60917", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60917", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html", }, { name: "NetBSD-SA2014-008", tags: [ "vendor-advisory", "x_refsource_NETBSD", ], url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60493", }, { name: "59710", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59710", }, { name: "60921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60921", }, { name: "openssl-cve20143507-dos(95161)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95161", }, { name: "HPSBOV03099", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "69078", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/69078", }, { name: "61100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", tags: [ "vendor-advisory", "x_refsource_FREEBSD", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61959", }, { name: "59756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59756", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58962", }, { name: "60938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60938", }, { name: "60684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60684", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=d0a4b7d1a2948fce38515b8d862f43e7ba0ebf74", }, { name: "MDVSA-2014:158", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127502", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-3507", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2014:1052", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1052.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1052.html", }, { name: "60221", refsource: "SECUNIA", url: "http://secunia.com/advisories/60221", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", }, { name: "60778", refsource: "SECUNIA", url: "http://secunia.com/advisories/60778", }, { name: "61184", refsource: "SECUNIA", url: "http://secunia.com/advisories/61184", }, { name: "SSRT101846", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60022", refsource: "SECUNIA", url: "http://secunia.com/advisories/60022", }, { name: "https://www.openssl.org/news/secadv_20140806.txt", refsource: "CONFIRM", url: "https://www.openssl.org/news/secadv_20140806.txt", }, { name: "61040", refsource: "SECUNIA", url: "http://secunia.com/advisories/61040", }, { name: "61017", refsource: "SECUNIA", url: "http://secunia.com/advisories/61017", }, { name: "61250", refsource: "SECUNIA", url: "http://secunia.com/advisories/61250", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10109", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10109", }, { name: "GLSA-201412-39", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201412-39.xml", }, { name: "HPSBHF03293", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142660345230545&w=2", }, { name: "60803", refsource: "SECUNIA", url: "http://secunia.com/advisories/60803", }, { name: "60824", refsource: "SECUNIA", url: "http://secunia.com/advisories/60824", }, { name: "HPSBUX03095", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "59700", refsource: "SECUNIA", url: "http://secunia.com/advisories/59700", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "1030693", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1030693", }, { name: "59743", refsource: "SECUNIA", url: "http://secunia.com/advisories/59743", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "60917", refsource: "SECUNIA", url: "http://secunia.com/advisories/60917", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html", }, { name: "NetBSD-SA2014-008", refsource: "NETBSD", url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", }, { name: "60493", refsource: "SECUNIA", url: "http://secunia.com/advisories/60493", }, { name: "59710", refsource: "SECUNIA", url: "http://secunia.com/advisories/59710", }, { name: "60921", refsource: "SECUNIA", url: "http://secunia.com/advisories/60921", }, { name: "openssl-cve20143507-dos(95161)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95161", }, { name: "HPSBOV03099", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141077370928502&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", }, { name: "69078", refsource: "BID", url: "http://www.securityfocus.com/bid/69078", }, { name: "61100", refsource: "SECUNIA", url: "http://secunia.com/advisories/61100", }, { name: "FreeBSD-SA-14:18", refsource: "FREEBSD", url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", }, { name: "61775", refsource: "SECUNIA", url: "http://secunia.com/advisories/61775", }, { name: "DSA-2998", refsource: "DEBIAN", url: "http://www.debian.org/security/2014/dsa-2998", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "SSRT101674", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140853041709441&w=2", }, { name: "61959", refsource: "SECUNIA", url: "http://secunia.com/advisories/61959", }, { name: "59756", refsource: "SECUNIA", url: "http://secunia.com/advisories/59756", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", }, { name: "58962", refsource: "SECUNIA", url: "http://secunia.com/advisories/58962", }, { name: "60938", refsource: "SECUNIA", url: "http://secunia.com/advisories/60938", }, { name: "60684", refsource: "SECUNIA", url: "http://secunia.com/advisories/60684", }, { name: "[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released", refsource: "MLIST", url: "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d0a4b7d1a2948fce38515b8d862f43e7ba0ebf74", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d0a4b7d1a2948fce38515b8d862f43e7ba0ebf74", }, { name: "MDVSA-2014:158", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:158", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1127502", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1127502", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-3507", datePublished: "2014-08-13T23:00:00", dateReserved: "2014-05-14T00:00:00", dateUpdated: "2024-08-06T10:43:06.463Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2010-5298
Vulnerability from cvelistv5
Published
2014-04-14 16:00
Modified
2024-08-07 04:17
Severity ?
EPSS score ?
Summary
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T04:17:10.312Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59669", }, { name: "66801", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/66801", }, { name: "HPSBGN03068", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59300", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://rt.openssl.org/Ticket/Display.html?id=3265&user=guest&pass=guest", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "MDVSA-2014:090", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:090", }, { name: "59440", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59440", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59655", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.citrix.com/article/CTX140876", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://advisories.mageia.org/MGASA-2014-0187.html", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58939", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59438", }, { name: "HPSBHF03052", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59301", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59413", }, { name: "[5.5] 004: SECURITY FIX: April 12, 2014", tags: [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred", ], url: "http://www.openbsd.org/errata55.html#004_openssl", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sig", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59721", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59450", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58977", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.blackberry.com/btsc/KB36051", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58337", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59162", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59490", }, { name: "[oss-security] 20140412 Use-after-free race condition,in OpenSSL's read buffer", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://openwall.com/lists/oss-security/2014/04/13/1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2010-02-08T00:00:00", descriptions: [ { lang: "en", value: "Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-10T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59669", }, { name: "66801", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/66801", }, { name: "HPSBGN03068", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59300", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { tags: [ "x_refsource_MISC", ], url: "https://rt.openssl.org/Ticket/Display.html?id=3265&user=guest&pass=guest", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "MDVSA-2014:090", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:090", }, { name: "59440", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59440", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59655", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.citrix.com/article/CTX140876", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://advisories.mageia.org/MGASA-2014-0187.html", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58939", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59438", }, { name: "HPSBHF03052", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59301", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59413", }, { name: "[5.5] 004: SECURITY FIX: April 12, 2014", tags: [ "vendor-advisory", "x_refsource_OPENBSD", ], url: "http://www.openbsd.org/errata55.html#004_openssl", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sig", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59721", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59450", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58977", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { tags: [ "x_refsource_MISC", ], url: "http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse", }, { tags: [ "x_refsource_MISC", ], url: "https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.blackberry.com/btsc/KB36051", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58337", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59162", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59490", }, { name: "[oss-security] 20140412 Use-after-free race condition,in OpenSSL's read buffer", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://openwall.com/lists/oss-security/2014/04/13/1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2010-5298", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "59342", refsource: "SECUNIA", url: "http://secunia.com/advisories/59342", }, { name: "59669", refsource: "SECUNIA", url: "http://secunia.com/advisories/59669", }, { name: "66801", refsource: "BID", url: "http://www.securityfocus.com/bid/66801", }, { name: "HPSBGN03068", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "HPSBMU03074", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59300", refsource: "SECUNIA", url: "http://secunia.com/advisories/59300", }, { name: "GLSA-201407-05", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "https://rt.openssl.org/Ticket/Display.html?id=3265&user=guest&pass=guest", refsource: "MISC", url: "https://rt.openssl.org/Ticket/Display.html?id=3265&user=guest&pass=guest", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg24037783", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "MDVSA-2014:090", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:090", }, { name: "59440", refsource: "SECUNIA", url: "http://secunia.com/advisories/59440", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", refsource: "SECUNIA", url: "http://secunia.com/advisories/59655", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", refsource: "SECUNIA", url: "http://secunia.com/advisories/59437", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "http://www.fortiguard.com/advisory/FG-IR-14-018/", refsource: "CONFIRM", url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676356", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { name: "http://support.citrix.com/article/CTX140876", refsource: "CONFIRM", url: "http://support.citrix.com/article/CTX140876", }, { name: "http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup", refsource: "CONFIRM", url: "http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "http://advisories.mageia.org/MGASA-2014-0187.html", refsource: "CONFIRM", url: "http://advisories.mageia.org/MGASA-2014-0187.html", }, { name: "58939", refsource: "SECUNIA", url: "http://secunia.com/advisories/58939", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", refsource: "SECUNIA", url: "http://secunia.com/advisories/59438", }, { name: "HPSBHF03052", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2", }, { name: "http://www.openssl.org/news/secadv_20140605.txt", refsource: "CONFIRM", url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "59301", refsource: "SECUNIA", url: "http://secunia.com/advisories/59301", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA80", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "HPSBMU03056", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "HPSBMU03051", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", refsource: "SECUNIA", url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", refsource: "SECUNIA", url: "http://secunia.com/advisories/59413", }, { name: "[5.5] 004: SECURITY FIX: April 12, 2014", refsource: "OPENBSD", url: "http://www.openbsd.org/errata55.html#004_openssl", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { name: "http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sig", refsource: "CONFIRM", url: "http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sig", }, { name: "59721", refsource: "SECUNIA", url: "http://secunia.com/advisories/59721", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "58713", refsource: "SECUNIA", url: "http://secunia.com/advisories/58713", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", refsource: "SECUNIA", url: "http://secunia.com/advisories/59450", }, { name: "59287", refsource: "SECUNIA", url: "http://secunia.com/advisories/59287", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "58977", refsource: "SECUNIA", url: "http://secunia.com/advisories/58977", }, { name: "https://www.novell.com/support/kb/doc.php?id=7015271", refsource: "CONFIRM", url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse", refsource: "MISC", url: "http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse", }, { name: "https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest", refsource: "MISC", url: "https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest", }, { name: "http://www.blackberry.com/btsc/KB36051", refsource: "CONFIRM", url: "http://www.blackberry.com/btsc/KB36051", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "58337", refsource: "SECUNIA", url: "http://secunia.com/advisories/58337", }, { name: "59162", refsource: "SECUNIA", url: "http://secunia.com/advisories/59162", }, { name: "59490", refsource: "SECUNIA", url: "http://secunia.com/advisories/59490", }, { name: "[oss-security] 20140412 Use-after-free race condition,in OpenSSL's read buffer", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2014/04/13/1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2010-5298", datePublished: "2014-04-14T16:00:00", dateReserved: "2014-04-14T00:00:00", dateUpdated: "2024-08-07T04:17:10.312Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-4000
Vulnerability from cvelistv5
Published
2015-05-21 00:00
Modified
2024-08-06 06:04
Severity ?
EPSS score ?
Summary
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T06:04:02.725Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2015:1184", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", }, { name: "SUSE-SU-2015:1177", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html", }, { name: "SSRT102180", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "RHSA-2015:1243", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1243.html", }, { name: "openSUSE-SU-2015:1229", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html", }, { name: "1033208", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033208", }, { name: "1032637", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032637", }, { name: "HPSBGN03404", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050121701297&w=2", }, { name: "DSA-3688", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3688", }, { name: "DSA-3287", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { name: "HPSBUX03512", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { name: "1032865", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032865", }, { name: "HPSBGN03351", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143557934009303&w=2", }, { name: "SUSE-SU-2015:1268", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html", }, { name: "SUSE-SU-2015:1150", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", }, { name: "1034728", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1034728", }, { name: "SUSE-SU-2015:1183", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html", }, { name: "1032656", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032656", }, { name: "RHSA-2016:2056", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2056.html", }, { name: "[oss-security] 20150520 CVE-2015-4000 - TLS does not properly convey server's ciphersuite choice", tags: [ "mailing-list", "x_transferred", ], url: "http://openwall.com/lists/oss-security/2015/05/20/8", }, { name: "openSUSE-SU-2015:1684", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html", }, { name: "HPSBGN03361", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143628304012255&w=2", }, { name: "HPSBGN03399", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144060576831314&w=2", }, { name: "1032475", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032475", }, { name: "1032960", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032960", }, { name: "openSUSE-SU-2016:0255", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html", }, { name: "1032653", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032653", }, { name: "SUSE-SU-2016:0224", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html", }, { name: "1033385", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033385", }, { name: "GLSA-201512-10", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201512-10", }, { name: "RHSA-2015:1229", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1229.html", }, { name: "openSUSE-SU-2016:0483", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html", }, { name: "1032864", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032864", }, { name: "1032910", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032910", }, { name: "1032645", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032645", }, { name: "USN-2706-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2706-1", }, { name: "GLSA-201701-46", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-46", }, { name: "RHSA-2015:1526", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1526.html", }, { name: "1033760", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033760", }, { name: "RHSA-2015:1485", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1485.html", }, { name: "RHSA-2015:1197", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1197.html", }, { name: "HPSBMU03401", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144104533800819&w=2", }, { name: "1032699", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032699", }, { name: "1032476", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032476", }, { name: "1032649", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032649", }, { name: "HPSBMU03345", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144043644216842&w=2", }, { name: "HPSBUX03363", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143637549705650&w=2", }, { name: "RHSA-2015:1544", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1544.html", }, { name: "FEDORA-2015-9130", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html", }, { name: "SUSE-SU-2015:1182", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", }, { name: "SSRT102112", tags: [ "vendor-advisory", "x_transferred", ], url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196", }, { name: "1032688", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032688", }, { name: "SUSE-SU-2015:1143", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", }, { name: "1032652", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032652", }, { name: "FEDORA-2015-9048", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html", }, { name: "RHSA-2015:1185", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1185.html", }, { name: "HPSBGN03362", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143558092609708&w=2", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "openSUSE-SU-2015:1289", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html", }, { name: "FEDORA-2015-9161", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html", }, { name: "HPSBGN03402", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144069189622016&w=2", }, { name: "1032648", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032648", }, { name: "1032759", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032759", }, { name: "RHSA-2015:1228", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1228.html", }, { name: "HPSBGN03405", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144060606031437&w=2", }, { name: "DSA-3316", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3316", }, { name: "1033209", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033209", }, { name: "1032871", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032871", }, { name: "DSA-3324", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3324", }, { name: "1032655", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032655", }, { name: "1033210", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033210", }, { name: "HPSBGN03411", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144061542602287&w=2", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "HPSBGN03533", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=145409266329539&w=2", }, { name: "USN-2673-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2673-1", }, { name: "1034884", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1034884", }, { name: "HPSBMU03356", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143506486712441&w=2", }, { name: "GLSA-201603-11", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201603-11", }, { name: "1033064", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033064", }, { name: "SUSE-SU-2015:1181", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html", }, { name: "1032778", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032778", }, { name: "1032474", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032474", }, { name: "SSRT102254", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { name: "HPSBGN03407", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144102017024820&w=2", }, { name: "openSUSE-SU-2015:1209", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html", }, { name: "1032784", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032784", }, { name: "1032777", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032777", }, { name: "1033416", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033416", }, { name: "1033991", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033991", }, { name: "1032647", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032647", }, { name: "1032654", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032654", }, { name: "1033341", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033341", }, { name: "RHSA-2015:1486", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1486.html", }, { name: "SUSE-SU-2015:1663", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html", }, { name: "1033433", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033433", }, { name: "USN-2696-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2696-1", }, { name: "APPLE-SA-2015-06-30-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html", }, { name: "1032702", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032702", }, { name: "DSA-3339", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3339", }, { name: "1032727", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032727", }, { name: "RHSA-2015:1242", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1242.html", }, { name: "SUSE-SU-2015:1269", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201506-02", }, { name: "91787", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "RHSA-2016:1624", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1624.html", }, { name: "openSUSE-SU-2015:1266", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", }, { name: "RHSA-2015:1488", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1488.html", }, { name: "SUSE-SU-2015:1319", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html", }, { name: "SUSE-SU-2015:1320", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html", }, { name: "1033430", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033430", }, { name: "openSUSE-SU-2015:1288", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html", }, { name: "RHSA-2015:1241", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1241.html", }, { name: "openSUSE-SU-2016:0478", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html", }, { name: "SUSE-SU-2015:1581", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html", }, { name: "HPSBUX03388", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "RHSA-2015:1230", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1230.html", }, { name: "74733", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/74733", }, { name: "openSUSE-SU-2016:0261", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html", }, { name: "1032651", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032651", }, { name: "1033065", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033065", }, { name: "USN-2656-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2656-1", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { name: "1033222", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033222", }, { name: "1036218", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036218", }, { name: "SUSE-SU-2015:1449", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html", }, { name: "HPSBGN03373", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143655800220052&w=2", }, { name: "1040630", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1040630", }, { name: "openSUSE-SU-2015:1139", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", }, { name: "1034087", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1034087", }, { name: "1033513", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033513", }, { name: "1032884", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032884", }, { name: "RHSA-2015:1604", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1604.html", }, { name: "SUSE-SU-2016:0262", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html", }, { name: "1032932", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032932", }, { name: "1033891", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033891", }, { name: "openSUSE-SU-2016:0226", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html", }, { name: "1032783", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032783", }, { name: "1032856", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032856", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", "x_transferred", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { name: "DSA-3300", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3300", }, { name: "USN-2656-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2656-2", }, { name: "1033067", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033067", }, { name: "1033019", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033019", }, { name: "RHSA-2015:1072", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1072.html", }, { name: "1032650", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032650", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujan2021.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962739", }, { tags: [ "x_transferred", ], url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { tags: [ "x_transferred", ], url: "http://support.apple.com/kb/HT204941", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21962816", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959812", }, { tags: [ "x_transferred", ], url: "https://www-304.ibm.com/support/docview.wss?uid=swg21959745", }, { tags: [ "x_transferred", ], url: "https://weakdh.org/imperfect-forward-secrecy.pdf", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21959132", }, { tags: [ "x_transferred", ], url: "https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959539", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959325", }, { tags: [ "x_transferred", ], url: "https://openssl.org/news/secadv/20150611.txt", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { tags: [ "x_transferred", ], url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778", }, { tags: [ "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21967893", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21958984", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959517", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959195", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961717", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960041", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960194", }, { tags: [ "x_transferred", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959453", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20150619-0001/", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959111", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960418", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246", }, { tags: [ "x_transferred", ], url: "https://www.suse.com/security/cve/CVE-2015-4000.html", }, { tags: [ "x_transferred", ], url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722", }, { tags: [ "x_transferred", ], url: "http://support.citrix.com/article/CTX201114", }, { tags: [ "x_transferred", ], url: "http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960380", }, { tags: [ "x_transferred", ], url: "http://support.apple.com/kb/HT204942", }, { tags: [ "x_transferred", ], url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083", }, { tags: [ "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959530", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960191", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959636", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", }, { tags: [ "x_transferred", ], url: "https://puppet.com/security/cve/CVE-2015-4000", }, { tags: [ "x_transferred", ], url: "http://www.mozilla.org/security/announce/2015/mfsa2015-70.html", }, { tags: [ "x_transferred", ], url: "http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789", }, { tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { tags: [ "x_transferred", ], url: "https://weakdh.org/", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959481", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa98", }, { tags: [ "x_transferred", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1138554", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962455", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150611.txt", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/2015-05-20-logjam-attack", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-05-19T00:00:00", descriptions: [ { lang: "en", value: "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "SUSE-SU-2015:1184", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", }, { name: "SUSE-SU-2015:1177", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html", }, { name: "SSRT102180", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "RHSA-2015:1243", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1243.html", }, { name: "openSUSE-SU-2015:1229", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html", }, { name: "1033208", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033208", }, { name: "1032637", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032637", }, { name: "HPSBGN03404", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050121701297&w=2", }, { name: "DSA-3688", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2016/dsa-3688", }, { name: "DSA-3287", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { name: "HPSBUX03512", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { name: "1032865", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032865", }, { name: "HPSBGN03351", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143557934009303&w=2", }, { name: "SUSE-SU-2015:1268", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html", }, { name: "SUSE-SU-2015:1150", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", }, { name: "1034728", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1034728", }, { name: "SUSE-SU-2015:1183", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html", }, { name: "1032656", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032656", }, { name: "RHSA-2016:2056", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-2056.html", }, { name: "[oss-security] 20150520 CVE-2015-4000 - TLS does not properly convey server's ciphersuite choice", tags: [ "mailing-list", ], url: "http://openwall.com/lists/oss-security/2015/05/20/8", }, { name: "openSUSE-SU-2015:1684", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html", }, { name: "HPSBGN03361", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143628304012255&w=2", }, { name: "HPSBGN03399", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144060576831314&w=2", }, { name: "1032475", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032475", }, { name: "1032960", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032960", }, { name: "openSUSE-SU-2016:0255", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html", }, { name: "1032653", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032653", }, { name: "SUSE-SU-2016:0224", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html", }, { name: "1033385", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033385", }, { name: "GLSA-201512-10", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201512-10", }, { name: "RHSA-2015:1229", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1229.html", }, { name: "openSUSE-SU-2016:0483", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html", }, { name: "1032864", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032864", }, { name: "1032910", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032910", }, { name: "1032645", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032645", }, { name: "USN-2706-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2706-1", }, { name: "GLSA-201701-46", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201701-46", }, { name: "RHSA-2015:1526", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1526.html", }, { name: "1033760", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033760", }, { name: "RHSA-2015:1485", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1485.html", }, { name: "RHSA-2015:1197", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1197.html", }, { name: "HPSBMU03401", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144104533800819&w=2", }, { name: "1032699", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032699", }, { name: "1032476", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032476", }, { name: "1032649", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032649", }, { name: "HPSBMU03345", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144043644216842&w=2", }, { name: "HPSBUX03363", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143637549705650&w=2", }, { name: "RHSA-2015:1544", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1544.html", }, { name: "FEDORA-2015-9130", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html", }, { name: "SUSE-SU-2015:1182", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", }, { name: "SSRT102112", tags: [ "vendor-advisory", ], url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196", }, { name: "1032688", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032688", }, { name: "SUSE-SU-2015:1143", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", }, { name: "1032652", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032652", }, { name: "FEDORA-2015-9048", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html", }, { name: "RHSA-2015:1185", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1185.html", }, { name: "HPSBGN03362", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143558092609708&w=2", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "openSUSE-SU-2015:1289", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html", }, { name: "FEDORA-2015-9161", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html", }, { name: "HPSBGN03402", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144069189622016&w=2", }, { name: "1032648", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032648", }, { name: "1032759", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032759", }, { name: "RHSA-2015:1228", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1228.html", }, { name: "HPSBGN03405", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144060606031437&w=2", }, { name: "DSA-3316", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3316", }, { name: "1033209", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033209", }, { name: "1032871", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032871", }, { name: "DSA-3324", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3324", }, { name: "1032655", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032655", }, { name: "1033210", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033210", }, { name: "HPSBGN03411", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144061542602287&w=2", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "HPSBGN03533", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=145409266329539&w=2", }, { name: "USN-2673-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2673-1", }, { name: "1034884", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1034884", }, { name: "HPSBMU03356", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143506486712441&w=2", }, { name: "GLSA-201603-11", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201603-11", }, { name: "1033064", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033064", }, { name: "SUSE-SU-2015:1181", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html", }, { name: "1032778", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032778", }, { name: "1032474", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032474", }, { name: "SSRT102254", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { name: "HPSBGN03407", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144102017024820&w=2", }, { name: "openSUSE-SU-2015:1209", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html", }, { name: "1032784", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032784", }, { name: "1032777", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032777", }, { name: "1033416", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033416", }, { name: "1033991", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033991", }, { name: "1032647", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032647", }, { name: "1032654", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032654", }, { name: "1033341", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033341", }, { name: "RHSA-2015:1486", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1486.html", }, { name: "SUSE-SU-2015:1663", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html", }, { name: "1033433", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033433", }, { name: "USN-2696-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2696-1", }, { name: "APPLE-SA-2015-06-30-1", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html", }, { name: "1032702", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032702", }, { name: "DSA-3339", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3339", }, { name: "1032727", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032727", }, { name: "RHSA-2015:1242", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1242.html", }, { name: "SUSE-SU-2015:1269", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201506-02", }, { name: "91787", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "RHSA-2016:1624", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1624.html", }, { name: "openSUSE-SU-2015:1266", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", }, { name: "RHSA-2015:1488", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1488.html", }, { name: "SUSE-SU-2015:1319", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html", }, { name: "SUSE-SU-2015:1320", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html", }, { name: "1033430", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033430", }, { name: "openSUSE-SU-2015:1288", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html", }, { name: "RHSA-2015:1241", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1241.html", }, { name: "openSUSE-SU-2016:0478", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html", }, { name: "SUSE-SU-2015:1581", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html", }, { name: "HPSBUX03388", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "RHSA-2015:1230", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1230.html", }, { name: "74733", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/74733", }, { name: "openSUSE-SU-2016:0261", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html", }, { name: "1032651", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032651", }, { name: "1033065", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033065", }, { name: "USN-2656-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2656-1", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { name: "1033222", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033222", }, { name: "1036218", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036218", }, { name: "SUSE-SU-2015:1449", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html", }, { name: "HPSBGN03373", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143655800220052&w=2", }, { name: "1040630", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1040630", }, { name: "openSUSE-SU-2015:1139", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", }, { name: "1034087", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1034087", }, { name: "1033513", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033513", }, { name: "1032884", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032884", }, { name: "RHSA-2015:1604", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1604.html", }, { name: "SUSE-SU-2016:0262", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html", }, { name: "1032932", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032932", }, { name: "1033891", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033891", }, { name: "openSUSE-SU-2016:0226", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html", }, { name: "1032783", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032783", }, { name: "1032856", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032856", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { name: "DSA-3300", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3300", }, { name: "USN-2656-2", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2656-2", }, { name: "1033067", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033067", }, { name: "1033019", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033019", }, { name: "RHSA-2015:1072", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1072.html", }, { name: "1032650", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032650", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { url: "https://www.oracle.com/security-alerts/cpujan2021.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962739", }, { url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { url: "http://support.apple.com/kb/HT204941", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21962816", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959812", }, { url: "https://www-304.ibm.com/support/docview.wss?uid=swg21959745", }, { url: "https://weakdh.org/imperfect-forward-secrecy.pdf", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21959132", }, { url: "https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959539", }, { url: "https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959325", }, { url: "https://openssl.org/news/secadv/20150611.txt", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778", }, { url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21967893", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21958984", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959517", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959195", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21961717", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960041", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960194", }, { url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959453", }, { url: "https://security.netapp.com/advisory/ntap-20150619-0001/", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959111", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960418", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246", }, { url: "https://www.suse.com/security/cve/CVE-2015-4000.html", }, { url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722", }, { url: "http://support.citrix.com/article/CTX201114", }, { url: "http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960380", }, { url: "http://support.apple.com/kb/HT204942", }, { url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083", }, { url: "http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959530", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21960191", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959636", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", }, { url: "https://puppet.com/security/cve/CVE-2015-4000", }, { url: "http://www.mozilla.org/security/announce/2015/mfsa2015-70.html", }, { url: "http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789", }, { url: "https://support.citrix.com/article/CTX216642", }, { url: "https://weakdh.org/", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21959481", }, { url: "https://bto.bluecoat.com/security-advisory/sa98", }, { url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1138554", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21962455", }, { url: "https://www.openssl.org/news/secadv_20150611.txt", }, { url: "http://www.fortiguard.com/advisory/2015-05-20-logjam-attack", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-4000", datePublished: "2015-05-21T00:00:00", dateReserved: "2015-05-15T00:00:00", dateUpdated: "2024-08-06T06:04:02.725Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-1790
Vulnerability from cvelistv5
Published
2015-06-12 00:00
Modified
2024-08-06 04:54
Severity ?
EPSS score ?
Summary
The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:54:15.966Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2015:1184", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", }, { name: "SSRT102180", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "DSA-3287", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { name: "SUSE-SU-2015:1150", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { name: "SUSE-SU-2015:1183", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html", }, { tags: [ "x_transferred", ], url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965", }, { tags: [ "x_transferred", ], url: "https://openssl.org/news/secadv/20150611.txt", }, { name: "RHSA-2015:1115", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1115.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "RHSA-2015:1197", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1197.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "SUSE-SU-2015:1182", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "SUSE-SU-2015:1143", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "1032564", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032564", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015", }, { name: "FEDORA-2015-10108", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "SUSE-SU-2015:1181", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html", }, { name: "APPLE-SA-2015-08-13-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "USN-2639-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2639-1", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201506-02", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "91787", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { tags: [ "x_transferred", ], url: "https://github.com/openssl/openssl/commit/59302b600e8d5b77ef144e447bb046fd7ab72686", }, { name: "HPSBUX03388", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", }, { name: "FEDORA-2015-10047", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT205031", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694", }, { name: "openSUSE-SU-2015:1139", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa98", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", "x_transferred", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150611.txt", }, { name: "75157", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/75157", }, { name: "HPSBGN03371", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143654156615516&w=2", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-06-11T00:00:00", descriptions: [ { lang: "en", value: "The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "SUSE-SU-2015:1184", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", }, { name: "SSRT102180", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "DSA-3287", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { name: "SUSE-SU-2015:1150", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { name: "SUSE-SU-2015:1183", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html", }, { url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965", }, { url: "https://openssl.org/news/secadv/20150611.txt", }, { name: "RHSA-2015:1115", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1115.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "RHSA-2015:1197", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1197.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "SUSE-SU-2015:1182", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "SUSE-SU-2015:1143", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "1032564", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032564", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015", }, { name: "FEDORA-2015-10108", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "SUSE-SU-2015:1181", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html", }, { name: "APPLE-SA-2015-08-13-2", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "USN-2639-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2639-1", }, { url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201506-02", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "91787", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91787", }, { url: "https://github.com/openssl/openssl/commit/59302b600e8d5b77ef144e447bb046fd7ab72686", }, { name: "HPSBUX03388", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", }, { name: "FEDORA-2015-10047", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html", }, { url: "https://support.apple.com/kb/HT205031", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694", }, { name: "openSUSE-SU-2015:1139", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa98", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { url: "https://www.openssl.org/news/secadv_20150611.txt", }, { name: "75157", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/75157", }, { name: "HPSBGN03371", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143654156615516&w=2", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-1790", datePublished: "2015-06-12T00:00:00", dateReserved: "2015-02-17T00:00:00", dateUpdated: "2024-08-06T04:54:15.966Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-1789
Vulnerability from cvelistv5
Published
2015-06-12 00:00
Modified
2024-08-06 04:54
Severity ?
EPSS score ?
Summary
The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:54:16.129Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2015:1184", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", }, { name: "SSRT102180", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "DSA-3287", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { name: "SUSE-SU-2015:1150", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { name: "SUSE-SU-2015:1183", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html", }, { tags: [ "x_transferred", ], url: "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11", }, { tags: [ "x_transferred", ], url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965", }, { tags: [ "x_transferred", ], url: "https://openssl.org/news/secadv/20150611.txt", }, { name: "RHSA-2015:1115", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1115.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "RHSA-2015:1197", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1197.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "SUSE-SU-2015:1182", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "SUSE-SU-2015:1143", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "1032564", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032564", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015", }, { name: "FEDORA-2015-10108", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", tags: [ "vendor-advisory", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "SUSE-SU-2015:1181", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html", }, { name: "APPLE-SA-2015-08-13-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "USN-2639-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2639-1", }, { tags: [ "x_transferred", ], url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201506-02", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "91787", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "HPSBUX03388", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", }, { name: "FEDORA-2015-10047", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html", }, { name: "75156", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/75156", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT205031", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694", }, { name: "openSUSE-SU-2015:1139", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa98", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", "x_transferred", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150611.txt", }, { name: "HPSBGN03371", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143654156615516&w=2", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-06-11T00:00:00", descriptions: [ { lang: "en", value: "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "SUSE-SU-2015:1184", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", }, { name: "SSRT102180", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { name: "DSA-3287", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3287", }, { name: "SUSE-SU-2015:1150", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", }, { name: "SUSE-SU-2015:1183", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html", }, { url: "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11", }, { url: "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965", }, { url: "https://openssl.org/news/secadv/20150611.txt", }, { name: "RHSA-2015:1115", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1115.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "RHSA-2015:1197", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1197.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "SUSE-SU-2015:1182", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", }, { name: "SUSE-SU-2015:1143", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "1032564", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032564", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", }, { url: "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015", }, { name: "FEDORA-2015-10108", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", tags: [ "vendor-advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { name: "SUSE-SU-2015:1181", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html", }, { name: "APPLE-SA-2015-08-13-2", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", }, { name: "USN-2639-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2639-1", }, { url: "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", }, { name: "GLSA-201506-02", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201506-02", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "91787", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "HPSBUX03388", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143880121627664&w=2", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", }, { name: "FEDORA-2015-10047", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html", }, { name: "75156", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/75156", }, { url: "https://support.apple.com/kb/HT205031", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { url: "https://support.citrix.com/article/CTX216642", }, { name: "SUSE-SU-2015:1185", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694", }, { name: "openSUSE-SU-2015:1139", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa98", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733", }, { name: "NetBSD-SA2015-008", tags: [ "vendor-advisory", ], url: "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", }, { url: "https://www.openssl.org/news/secadv_20150611.txt", }, { name: "HPSBGN03371", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143654156615516&w=2", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-1789", datePublished: "2015-06-12T00:00:00", dateReserved: "2015-02-17T00:00:00", dateUpdated: "2024-08-06T04:54:16.129Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-0287
Vulnerability from cvelistv5
Published
2015-03-19 00:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:03:10.946Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { name: "openSUSE-SU-2015:0554", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "DSA-3197", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3197", }, { name: "USN-2537-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { tags: [ "x_transferred", ], url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { tags: [ "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa92", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/news/secadv_20150319.txt", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/HT205212", }, { name: "73227", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/73227", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "FEDORA-2015-6951", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { tags: [ "x_transferred", ], url: "https://access.redhat.com/articles/1384453", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/HT205267", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "SUSE-SU-2015:0541", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { name: "HPSBGN03306", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2", }, { tags: [ "x_transferred", ], url: "http://support.apple.com/kb/HT204942", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "FreeBSD-SA-15:06", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "1031929", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "APPLE-SA-2015-09-16-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX216642", }, { name: "SUSE-SU-2016:0678", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html", }, { name: "FEDORA-2015-6855", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202380", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201503-11", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-03-19T00:00:00", descriptions: [ { lang: "en", value: "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-13T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:0715", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0715.html", }, { name: "openSUSE-SU-2015:0554", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", }, { name: "DSA-3197", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3197", }, { name: "USN-2537-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2537-1", }, { url: "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f", }, { name: "HPSBMU03409", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050155601375&w=2", }, { name: "FEDORA-2015-4303", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", }, { url: "https://bto.bluecoat.com/security-advisory/sa92", }, { url: "https://www.openssl.org/news/secadv_20150319.txt", }, { url: "https://support.apple.com/HT205212", }, { name: "73227", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/73227", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", }, { name: "HPSBMU03380", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143748090628601&w=2", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "FEDORA-2015-4300", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", }, { name: "APPLE-SA-2015-06-30-2", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", }, { name: "FEDORA-2015-6951", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { url: "https://access.redhat.com/articles/1384453", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "openSUSE-SU-2015:1277", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", }, { url: "https://support.apple.com/HT205267", }, { name: "HPSBUX03334", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "MDVSA-2015:063", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", }, { name: "SUSE-SU-2015:0541", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", }, { name: "RHSA-2015:0716", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0716.html", }, { name: "HPSBGN03306", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=142841429220765&w=2", }, { url: "http://support.apple.com/kb/HT204942", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "FreeBSD-SA-15:06", tags: [ "vendor-advisory", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", }, { name: "HPSBMU03397", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144050297101809&w=2", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "RHSA-2015:0752", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0752.html", }, { name: "RHSA-2015:0800", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-0800.html", }, { name: "1031929", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1031929", }, { name: "SSRT102000", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143213830203296&w=2", }, { name: "APPLE-SA-2015-09-16-1", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "FEDORA-2015-4320", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", }, { url: "https://support.citrix.com/article/CTX216642", }, { name: "SUSE-SU-2016:0678", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html", }, { name: "FEDORA-2015-6855", tags: [ "vendor-advisory", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=1202380", }, { name: "GLSA-201503-11", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201503-11", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2015-0287", datePublished: "2015-03-19T00:00:00", dateReserved: "2014-11-18T00:00:00", dateUpdated: "2024-08-06T04:03:10.946Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-0221
Vulnerability from cvelistv5
Published
2014-06-05 21:00
Modified
2024-08-06 09:05
Severity ?
EPSS score ?
Summary
The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T09:05:39.372Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59669", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015300", }, { name: "59990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59990", }, { name: "1030337", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1030337", }, { name: "59454", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59454", }, { name: "59126", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59126", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015264", }, { name: "59306", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59306", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "HPSBUX03046", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "61254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61254", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", }, { name: "59895", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59895", }, { name: "59449", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59449", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59189", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59189", }, { name: "MDVSA-2014:106", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59300", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "59284", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59284", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59365", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "59495", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59495", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58945", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "59659", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59659", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "59429", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59429", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59655", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "59310", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59310", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.citrix.com/article/CTX140876", }, { name: "59167", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59167", }, { name: "59120", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59120", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "HPSBMU03069", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140499827729550&w=2", }, { name: "MDVSA-2014:105", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105", }, { name: "59460", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59460", }, { name: "RHSA-2014:1021", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1021.html", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59027", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59027", }, { name: "59514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59514", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676226", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { name: "67901", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/67901", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { name: "59221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59221", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "58714", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58615", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT6443", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59301", }, { name: "59784", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59784", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "59192", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59175", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59413", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59721", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59450", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59491", }, { name: "59364", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59364", }, { name: "59451", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59451", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58977", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "60571", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60571", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=d3152655d5319ce883c8e3ac4b99f8de4c59d846", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.blackberry.com/btsc/KB36051", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "60687", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60687", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103593", }, { name: "59528", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59528", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58337", }, { name: "59518", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59518", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59162", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59490", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", }, { name: "HPSBMU03065", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-06-05T00:00:00", descriptions: [ { lang: "en", value: "The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-09T18:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59669", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015300", }, { name: "59990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59990", }, { name: "1030337", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1030337", }, { name: "59454", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59454", }, { name: "59126", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59126", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015264", }, { name: "59306", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59306", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "HPSBUX03046", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "61254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61254", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", }, { name: "59895", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59895", }, { name: "59449", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59449", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59189", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59189", }, { name: "MDVSA-2014:106", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59300", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "59284", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59284", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59365", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "59495", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59495", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58945", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "59659", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59659", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "59429", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59429", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59655", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "59310", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59310", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.citrix.com/article/CTX140876", }, { name: "59167", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59167", }, { name: "59120", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59120", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "HPSBMU03069", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140499827729550&w=2", }, { name: "MDVSA-2014:105", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105", }, { name: "59460", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59460", }, { name: "RHSA-2014:1021", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1021.html", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59027", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59027", }, { name: "59514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59514", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676226", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { name: "67901", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/67901", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { name: "59221", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59221", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "58714", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58615", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT6443", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59301", }, { name: "59784", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59784", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "59192", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59175", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59413", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59721", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59450", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59491", }, { name: "59364", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59364", }, { name: "59451", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59451", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58977", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "60571", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60571", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=d3152655d5319ce883c8e3ac4b99f8de4c59d846", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.blackberry.com/btsc/KB36051", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "60687", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60687", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103593", }, { name: "59528", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59528", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58337", }, { name: "59518", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59518", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59162", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59490", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", }, { name: "HPSBMU03065", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-0221", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "59342", refsource: "SECUNIA", url: "http://secunia.com/advisories/59342", }, { name: "59669", refsource: "SECUNIA", url: "http://secunia.com/advisories/59669", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015300", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015300", }, { name: "59990", refsource: "SECUNIA", url: "http://secunia.com/advisories/59990", }, { name: "1030337", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1030337", }, { name: "59454", refsource: "SECUNIA", url: "http://secunia.com/advisories/59454", }, { name: "59126", refsource: "SECUNIA", url: "http://secunia.com/advisories/59126", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015264", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015264", }, { name: "59306", refsource: "SECUNIA", url: "http://secunia.com/advisories/59306", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "HPSBUX03046", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "61254", refsource: "SECUNIA", url: "http://secunia.com/advisories/61254", }, { name: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", refsource: "CONFIRM", url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", }, { name: "59895", refsource: "SECUNIA", url: "http://secunia.com/advisories/59895", }, { name: "59449", refsource: "SECUNIA", url: "http://secunia.com/advisories/59449", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", refsource: "SECUNIA", url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "59189", refsource: "SECUNIA", url: "http://secunia.com/advisories/59189", }, { name: "MDVSA-2014:106", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "59300", refsource: "SECUNIA", url: "http://secunia.com/advisories/59300", }, { name: "GLSA-201407-05", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "59284", refsource: "SECUNIA", url: "http://secunia.com/advisories/59284", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg24037783", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", refsource: "SECUNIA", url: "http://secunia.com/advisories/59365", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "59495", refsource: "SECUNIA", url: "http://secunia.com/advisories/59495", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", refsource: "SECUNIA", url: "http://secunia.com/advisories/58945", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "59659", refsource: "SECUNIA", url: "http://secunia.com/advisories/59659", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "59429", refsource: "SECUNIA", url: "http://secunia.com/advisories/59429", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", refsource: "SECUNIA", url: "http://secunia.com/advisories/59655", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { name: "59437", refsource: "SECUNIA", url: "http://secunia.com/advisories/59437", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "59310", refsource: "SECUNIA", url: "http://secunia.com/advisories/59310", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { name: "http://www.fortiguard.com/advisory/FG-IR-14-018/", refsource: "CONFIRM", url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676793", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676356", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBMU03057", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { name: "http://support.citrix.com/article/CTX140876", refsource: "CONFIRM", url: "http://support.citrix.com/article/CTX140876", }, { name: "59167", refsource: "SECUNIA", url: "http://secunia.com/advisories/59167", }, { name: "59120", refsource: "SECUNIA", url: "http://secunia.com/advisories/59120", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "HPSBMU03069", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140499827729550&w=2", }, { name: "MDVSA-2014:105", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105", }, { name: "59460", refsource: "SECUNIA", url: "http://secunia.com/advisories/59460", }, { name: "RHSA-2014:1021", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1021.html", }, { name: "58939", refsource: "SECUNIA", url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59027", refsource: "SECUNIA", url: "http://secunia.com/advisories/59027", }, { name: "59514", refsource: "SECUNIA", url: "http://secunia.com/advisories/59514", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676226", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676226", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { name: "67901", refsource: "BID", url: "http://www.securityfocus.com/bid/67901", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { name: "59221", refsource: "SECUNIA", url: "http://secunia.com/advisories/59221", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "58714", refsource: "SECUNIA", url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { name: "http://www.openssl.org/news/secadv_20140605.txt", refsource: "CONFIRM", url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", refsource: "SECUNIA", url: "http://secunia.com/advisories/58615", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "http://support.apple.com/kb/HT6443", refsource: "CONFIRM", url: "http://support.apple.com/kb/HT6443", }, { name: "59301", refsource: "SECUNIA", url: "http://secunia.com/advisories/59301", }, { name: "59784", refsource: "SECUNIA", url: "http://secunia.com/advisories/59784", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA80", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBMU03076", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "59192", refsource: "SECUNIA", url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "HPSBMU03056", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", refsource: "SECUNIA", url: "http://secunia.com/advisories/59175", }, { name: "HPSBMU03051", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", refsource: "SECUNIA", url: "http://secunia.com/advisories/59666", }, { name: "HPSBMU03055", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", refsource: "SECUNIA", url: "http://secunia.com/advisories/59413", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { name: "59721", refsource: "SECUNIA", url: "http://secunia.com/advisories/59721", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "58713", refsource: "SECUNIA", url: "http://secunia.com/advisories/58713", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "59450", refsource: "SECUNIA", url: "http://secunia.com/advisories/59450", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1053.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "59287", refsource: "SECUNIA", url: "http://secunia.com/advisories/59287", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", refsource: "SECUNIA", url: "http://secunia.com/advisories/59491", }, { name: "59364", refsource: "SECUNIA", url: "http://secunia.com/advisories/59364", }, { name: "59451", refsource: "SECUNIA", url: "http://secunia.com/advisories/59451", }, { name: "58977", refsource: "SECUNIA", url: "http://secunia.com/advisories/58977", }, { name: "https://www.novell.com/support/kb/doc.php?id=7015271", refsource: "CONFIRM", url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "60571", refsource: "SECUNIA", url: "http://secunia.com/advisories/60571", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d3152655d5319ce883c8e3ac4b99f8de4c59d846", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d3152655d5319ce883c8e3ac4b99f8de4c59d846", }, { name: "http://www.blackberry.com/btsc/KB36051", refsource: "CONFIRM", url: "http://www.blackberry.com/btsc/KB36051", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "60687", refsource: "SECUNIA", url: "http://secunia.com/advisories/60687", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1103593", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103593", }, { name: "59528", refsource: "SECUNIA", url: "http://secunia.com/advisories/59528", }, { name: "58337", refsource: "SECUNIA", url: "http://secunia.com/advisories/58337", }, { name: "59518", refsource: "SECUNIA", url: "http://secunia.com/advisories/59518", }, { name: "59162", refsource: "SECUNIA", url: "http://secunia.com/advisories/59162", }, { name: "59490", refsource: "SECUNIA", url: "http://secunia.com/advisories/59490", }, { name: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", refsource: "CONFIRM", url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", }, { name: "HPSBMU03065", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-0221", datePublished: "2014-06-05T21:00:00", dateReserved: "2013-12-03T00:00:00", dateUpdated: "2024-08-06T09:05:39.372Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.