7.5 CVE-2014-0160

CISA Kev Catalog Patch Exploit
 

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
https://nvd.nist.gov/vuln/detail/CVE-2014-0160

Categories

CWE-125

References

secalert@redhat.com Patch Exploit

http://advisories.mageia.org/MGASA-2014-0165.html
Third Party Advisory
http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/
Issue Tracking Third Party Advisory
http://cogentdatahub.com/ReleaseNotes.html
Release Notes
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01
Broken Link
http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9...
Broken Link
http://heartbleed.com/
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html
Broken Link Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html
Broken Link Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473....
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139722163017074&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139757726426985&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139757819327350&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139757919027752&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139758572430452&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139765756720506&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139774054614965&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139774703817488&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139808058921905&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139817685517037&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139817727317190&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139817782017443&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139824923705461&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139824993005633&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139833395230364&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139835815211508&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139835844111589&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139836085512508&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139842151128341&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139843768401936&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139869720529462&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139869891830365&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139889113431619&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139889295732144&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905202427693&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905243827825&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905295427946&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905351928096&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905405728262&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905458328378&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905653828999&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905868529690&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140015787404650&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140075368411126&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140724451518351&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140752315422991&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=141287864628122&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=142660345230545&w=2
Mailing List Third Party Advisory
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.a...
Third Party Advisory
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.a...
Permissions Required Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0376.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0377.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0378.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0396.html
Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/109
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/173
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/190
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/90
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/91
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Dec/23
Mailing List Third Party Advisory
http://secunia.com/advisories/57347
Broken Link Third Party Advisory
http://secunia.com/advisories/57483
Broken Link Third Party Advisory
http://secunia.com/advisories/57721
Broken Link Third Party Advisory
http://secunia.com/advisories/57836
Broken Link Third Party Advisory
http://secunia.com/advisories/57966
Broken Link Third Party Advisory
http://secunia.com/advisories/57968
Broken Link Third Party Advisory
http://secunia.com/advisories/59139
Broken Link Third Party Advisory
http://secunia.com/advisories/59243
Broken Link Third Party Advisory
http://secunia.com/advisories/59347
Broken Link Third Party Advisory
http://support.citrix.com/article/CTX140605
Third Party Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa...
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg400001841
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg400001843
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21670161
Broken Link
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
Broken Link Third Party Advisory
http://www.blackberry.com/btsc/KB35882
Broken Link
http://www.debian.org/security/2014/dsa-2896
Mailing List Third Party Advisory
http://www.exploit-db.com/exploits/32745
Exploit Third Party Advisory VDB Entry
http://www.exploit-db.com/exploits/32764
Exploit Third Party Advisory VDB Entry
http://www.f-secure.com/en/web/labs_global/fsc-2014-1
Broken Link Third Party Advisory
http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
Release Notes
http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-r...
Third Party Advisory
http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
Release Notes
http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
Release Notes
http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
Not Applicable
http://www.kb.cert.org/vuls/id/720951
Third Party Advisory US Government Resource
http://www.kerio.com/support/kerio-control/release-history
Broken Link Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
Broken Link Third Party Advisory
http://www.openssl.org/news/secadv_20140407.txt
Broken Link Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0...
Patch Third Party Advisory
http://www.securityfocus.com/archive/1/534161/100/0/threaded
Broken Link Not Applicable Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/66690
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030026
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030074
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030077
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030078
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030079
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030080
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030081
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030082
Broken Link Third Party Advisory VDB Entry
http://www.splunk.com/view/SP-CAAAMB3
Third Party Advisory
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=secu...
Third Party Advisory
http://www.ubuntu.com/usn/USN-2165-1
Third Party Advisory
http://www.us-cert.gov/ncas/alerts/TA14-098A
Third Party Advisory US Government Resource
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Broken Link
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in...
Broken Link
https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1084875
Issue Tracking Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf
Third Party Advisory
https://code.google.com/p/mod-spdy/issues/detail?id=85
Issue Tracking
https://filezilla-project.org/versions.php?type=server
Release Notes
https://gist.github.com/chapmajs/10473815
Exploit
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDispla...
Broken Link
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883a...
Mailing List Patch Third Party Advisory
https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c1...
Mailing List Patch Third Party Advisory
https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b40...
Mailing List Patch Third Party Advisory
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3...
Mailing List Patch Third Party Advisory
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html
Mailing List Third Party Advisory
https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html
Exploit Permissions Required Third Party Advisory
https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html
Third Party Advisory
https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=3...
Third Party Advisory
https://www.cert.fi/en/reports/2014/vulnerability788210.html
Not Applicable Third Party Advisory
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-securit...
Third Party Advisory
https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-atta...
Broken Link Exploit Third Party Advisory


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* >= 1.0.1 < 1.0.1g
Configuration 2
cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:* < 0.9.44
Configuration 3
AND
   cpe:2.3:o:siemens:application_processing_engine_firmware:2.0:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:siemens:application_processing_engine:-:*:*:*:*:*:*:*
Configuration 4
AND
   cpe:2.3:o:siemens:cp_1543-1_firmware:1.1:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*
Configuration 5
AND
   cpe:2.3:o:siemens:simatic_s7-1500_firmware:1.5:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*
Configuration 6
AND
   cpe:2.3:o:siemens:simatic_s7-1500t_firmware:1.5:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:siemens:simatic_s7-1500t:-:*:*:*:*:*:*:*
Configuration 7
cpe:2.3:a:siemens:elan-8.2:*:*:*:*:*:*:*:* < 8.3.3
cpe:2.3:a:siemens:wincc_open_architecture:3.12:*:*:*:*:*:*:*
Configuration 8
AND
   cpe:2.3:o:intellian:v100_firmware:1.20:*:*:*:*:*:*:*
   cpe:2.3:o:intellian:v100_firmware:1.21:*:*:*:*:*:*:*
   cpe:2.3:o:intellian:v100_firmware:1.24:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:intellian:v100:-:*:*:*:*:*:*:*
Configuration 9
AND
   cpe:2.3:o:intellian:v60_firmware:1.15:*:*:*:*:*:*:*
   cpe:2.3:o:intellian:v60_firmware:1.25:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:intellian:v60:-:*:*:*:*:*:*:*
Configuration 10
cpe:2.3:a:mitel:micollab:6.0:*:*:*:*:*:*:*
cpe:2.3:a:mitel:micollab:7.0:*:*:*:*:*:*:*
cpe:2.3:a:mitel:micollab:7.1:*:*:*:*:*:*:*
cpe:2.3:a:mitel:micollab:7.2:*:*:*:*:*:*:*
cpe:2.3:a:mitel:micollab:7.3:*:*:*:*:*:*:*
cpe:2.3:a:mitel:micollab:7.3.0.104:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoice:1.1.2.5:*:*:*:*:lync:*:*
cpe:2.3:a:mitel:mivoice:1.1.3.3:*:*:*:*:skype_for_business:*:*
cpe:2.3:a:mitel:mivoice:1.2.0.11:*:*:*:*:skype_for_business:*:*
cpe:2.3:a:mitel:mivoice:1.3.2.2:*:*:*:*:skype_for_business:*:*
cpe:2.3:a:mitel:mivoice:1.4.0.102:*:*:*:*:skype_for_business:*:*
Configuration 11
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Configuration 12
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
Configuration 13
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
Configuration 14
cpe:2.3:a:redhat:gluster_storage:2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Configuration 15
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Configuration 16
AND
   cpe:2.3:o:ricon:s9922l_firmware:16.10.3(3794):*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:ricon:s9922l:1.0:*:*:*:*:*:*:*
Configuration 17
cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.1:*:*:*:*:*:*:*
Configuration 18
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* >= 6.0.0 < 6.0.3


REMEDIATION


Patch

Url
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0...
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883a...
https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c1...
https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b40...
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3...


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
http://www.exploit-db.com/exploits/32745
http://www.exploit-db.com/exploits/32764
https://gist.github.com/chapmajs/10473815
https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html
https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-atta...


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry