7.5 CVE-2014-0160

CISA Kev Catalog Patch Exploit
 

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
https://nvd.nist.gov/vuln/detail/CVE-2014-0160

Categories

CWE-125 : Out-of-bounds Read
The product reads data past the end, or before the beginning, of the intended buffer. When an out-of-bounds read occurs, typically the product has already made a separate mistake, such as modifying an index or performing pointer arithmetic that produces an out-of-bounds address. Shorthand for "Out of bounds" read Fuzz testing (fuzzing) is a powerful technique for generating large numbers of diverse inputs - either randomly or algorithmically - and dynamically invoking the code with those inputs. Even with random inputs, it is often capable of generating unexpected results such as crashes, memory corruption, or resource consumption. Fuzzing effectively produces repeatable test cases that clearly indicate bugs, which helps developers to diagnose the issues. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) Use a language that provides appropriate memory abstractions. The reference implementation code for a Trusted Platform Module does not implement length checks on data, allowing for an attacker to read 2 bytes past the end of a buffer. Out-of-bounds read in IP stack used in embedded systems, as exploited in the wild per CISA KEV. Chain: "Heartbleed" bug receives an inconsistent length parameter (CWE-130) enabling an out-of-bounds read (CWE-126), returning memory that could include private cryptographic keys and other sensitive data. HTML conversion package has a buffer under-read, allowing a crash Chain: unexpected sign extension (CWE-194) leads to integer overflow (CWE-190), causing an out-of-bounds read (CWE-125) Chain: product does not handle when an input string is not NULL terminated (CWE-170), leading to buffer over-read (CWE-125) or heap-based buffer overflow (CWE-122). Chain: series of floating-point precision errors(CWE-1339) in a web browser rendering engine causes out-of-bounds read(CWE-125), giving access to cross-origin data out-of-bounds read due to improper length check packet with large number of specified elements cause out-of-bounds read. packet with large number of specified elements cause out-of-bounds read. out-of-bounds read, resultant from integer underflow large length value causes out-of-bounds read malformed image causes out-of-bounds read OS kernel trusts userland-supplied length value, allowing reading of sensitive information

References

af854a3a-2127-422b-91ae-364da2661108 Patch Exploit

http://advisories.mageia.org/MGASA-2014-0165.html
Third Party Advisory
http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/
Issue Tracking Third Party Advisory
http://cogentdatahub.com/ReleaseNotes.html
Release Notes
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01
Broken Link
http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9...
Broken Link
http://heartbleed.com/
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html
Broken Link Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html
Broken Link Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473....
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139722163017074&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139757726426985&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139757819327350&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139757919027752&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139758572430452&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139765756720506&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139774054614965&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139774703817488&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139808058921905&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139817685517037&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139817727317190&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139817782017443&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139824923705461&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139824993005633&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139833395230364&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139835815211508&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139835844111589&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139836085512508&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139842151128341&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139843768401936&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139869720529462&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139869891830365&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139889113431619&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139889295732144&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905202427693&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905243827825&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905295427946&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905351928096&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905405728262&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905458328378&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905653828999&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905868529690&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140015787404650&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140075368411126&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140724451518351&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140752315422991&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=141287864628122&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=142660345230545&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=142660345230545&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=142660345230545&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=142660345230545&w=2
Mailing List Third Party Advisory
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.a...
Third Party Advisory
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.a...
Permissions Required Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0376.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0377.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0378.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0396.html
Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/109
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/173
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/190
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/90
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/91
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Dec/23
Mailing List Third Party Advisory
http://secunia.com/advisories/57347
Broken Link Third Party Advisory
http://secunia.com/advisories/57483
Broken Link Third Party Advisory
http://secunia.com/advisories/57721
Broken Link Third Party Advisory
http://secunia.com/advisories/57836
Broken Link Third Party Advisory
http://secunia.com/advisories/57966
Broken Link Third Party Advisory
http://secunia.com/advisories/57968
Broken Link Third Party Advisory
http://secunia.com/advisories/59139
Broken Link Third Party Advisory
http://secunia.com/advisories/59243
Broken Link Third Party Advisory
http://secunia.com/advisories/59347
Broken Link Third Party Advisory
http://support.citrix.com/article/CTX140605
Third Party Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa...
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg400001841
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg400001843
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21670161
Broken Link
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
Broken Link Third Party Advisory
http://www.blackberry.com/btsc/KB35882
Broken Link
http://www.debian.org/security/2014/dsa-2896
Mailing List Third Party Advisory
http://www.exploit-db.com/exploits/32745
Exploit Third Party Advisory VDB Entry
http://www.exploit-db.com/exploits/32764
Exploit Third Party Advisory VDB Entry
http://www.f-secure.com/en/web/labs_global/fsc-2014-1
Broken Link Third Party Advisory
http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
Release Notes
http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-r...
Third Party Advisory
http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
Release Notes
http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
Release Notes
http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
Not Applicable
http://www.kb.cert.org/vuls/id/720951
Third Party Advisory US Government Resource
http://www.kerio.com/support/kerio-control/release-history
Broken Link Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
Broken Link Third Party Advisory
http://www.openssl.org/news/secadv_20140407.txt
Broken Link Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0...
Patch Third Party Advisory
http://www.securityfocus.com/archive/1/534161/100/0/threaded
Broken Link Not Applicable Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/66690
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030026
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030074
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030077
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030078
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030079
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030080
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030081
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030082
Broken Link Third Party Advisory VDB Entry
http://www.splunk.com/view/SP-CAAAMB3
Third Party Advisory
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=secu...
Third Party Advisory
http://www.ubuntu.com/usn/USN-2165-1
Third Party Advisory
http://www.us-cert.gov/ncas/alerts/TA14-098A
Third Party Advisory US Government Resource
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Broken Link
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in...
Broken Link
https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1084875
Issue Tracking Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf
Third Party Advisory
https://code.google.com/p/mod-spdy/issues/detail?id=85
Issue Tracking
https://filezilla-project.org/versions.php?type=server
Release Notes
https://gist.github.com/chapmajs/10473815
Exploit
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDispla...
Broken Link
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883a...
Mailing List Patch Third Party Advisory
https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c1...
Mailing List Patch Third Party Advisory
https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b40...
Mailing List Patch Third Party Advisory
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3...
Mailing List Patch Third Party Advisory
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html
Mailing List Third Party Advisory
https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html
Exploit Permissions Required Third Party Advisory
https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html
Third Party Advisory
https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=3...
Third Party Advisory
https://www.cert.fi/en/reports/2014/vulnerability788210.html
Not Applicable Third Party Advisory
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-securit...
Third Party Advisory
https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-atta...
Broken Link Exploit Third Party Advisory

secalert@redhat.com Patch Exploit

http://advisories.mageia.org/MGASA-2014-0165.html
Third Party Advisory
http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/
Issue Tracking Third Party Advisory
http://cogentdatahub.com/ReleaseNotes.html
Release Notes
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01
Broken Link
http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9...
Broken Link
http://heartbleed.com/
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html
Broken Link Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html
Broken Link Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473....
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139722163017074&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139757726426985&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139757819327350&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139757919027752&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139758572430452&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139765756720506&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139774054614965&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139774703817488&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139808058921905&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139817685517037&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139817727317190&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139817782017443&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139824923705461&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139824993005633&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139833395230364&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139835815211508&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139835844111589&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139836085512508&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139842151128341&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139843768401936&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139869720529462&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139869891830365&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139889113431619&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139889295732144&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905202427693&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905243827825&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905295427946&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905351928096&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905405728262&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905458328378&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905653828999&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139905868529690&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140015787404650&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140075368411126&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140724451518351&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140752315422991&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=141287864628122&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=142660345230545&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=142660345230545&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=142660345230545&w=2
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=142660345230545&w=2
Mailing List Third Party Advisory
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.a...
Third Party Advisory
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.a...
Permissions Required Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0376.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0377.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0378.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0396.html
Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/109
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/173
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/190
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/90
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Apr/91
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2014/Dec/23
Mailing List Third Party Advisory
http://secunia.com/advisories/57347
Broken Link Third Party Advisory
http://secunia.com/advisories/57483
Broken Link Third Party Advisory
http://secunia.com/advisories/57721
Broken Link Third Party Advisory
http://secunia.com/advisories/57836
Broken Link Third Party Advisory
http://secunia.com/advisories/57966
Broken Link Third Party Advisory
http://secunia.com/advisories/57968
Broken Link Third Party Advisory
http://secunia.com/advisories/59139
Broken Link Third Party Advisory
http://secunia.com/advisories/59243
Broken Link Third Party Advisory
http://secunia.com/advisories/59347
Broken Link Third Party Advisory
http://support.citrix.com/article/CTX140605
Third Party Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa...
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg400001841
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg400001843
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21670161
Broken Link
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
Broken Link Third Party Advisory
http://www.blackberry.com/btsc/KB35882
Broken Link
http://www.debian.org/security/2014/dsa-2896
Mailing List Third Party Advisory
http://www.exploit-db.com/exploits/32745
Exploit Third Party Advisory VDB Entry
http://www.exploit-db.com/exploits/32764
Exploit Third Party Advisory VDB Entry
http://www.f-secure.com/en/web/labs_global/fsc-2014-1
Broken Link Third Party Advisory
http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
Release Notes
http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-r...
Third Party Advisory
http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
Release Notes
http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
Release Notes
http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
Not Applicable
http://www.kb.cert.org/vuls/id/720951
Third Party Advisory US Government Resource
http://www.kerio.com/support/kerio-control/release-history
Broken Link Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
Broken Link Third Party Advisory
http://www.openssl.org/news/secadv_20140407.txt
Broken Link Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0...
Patch Third Party Advisory
http://www.securityfocus.com/archive/1/534161/100/0/threaded
Broken Link Not Applicable Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/66690
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030026
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030074
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030077
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030078
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030079
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030080
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030081
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030082
Broken Link Third Party Advisory VDB Entry
http://www.splunk.com/view/SP-CAAAMB3
Third Party Advisory
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=secu...
Third Party Advisory
http://www.ubuntu.com/usn/USN-2165-1
Third Party Advisory
http://www.us-cert.gov/ncas/alerts/TA14-098A
Third Party Advisory US Government Resource
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Broken Link
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in...
Broken Link
https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1084875
Issue Tracking Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf
Third Party Advisory
https://code.google.com/p/mod-spdy/issues/detail?id=85
Issue Tracking
https://filezilla-project.org/versions.php?type=server
Release Notes
https://gist.github.com/chapmajs/10473815
Exploit
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDispla...
Broken Link
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883a...
Mailing List Patch Third Party Advisory
https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c1...
Mailing List Patch Third Party Advisory
https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b40...
Mailing List Patch Third Party Advisory
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3...
Mailing List Patch Third Party Advisory
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html
Mailing List Third Party Advisory
https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html
Exploit Permissions Required Third Party Advisory
https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html
Third Party Advisory
https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=3...
Third Party Advisory
https://www.cert.fi/en/reports/2014/vulnerability788210.html
Not Applicable Third Party Advisory
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-securit...
Third Party Advisory
https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-atta...
Broken Link Exploit Third Party Advisory


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* >= 1.0.1 < 1.0.1g
Configuration 2
cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:* < 0.9.44
Configuration 3
AND
   cpe:2.3:o:siemens:application_processing_engine_firmware:2.0:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:siemens:application_processing_engine:-:*:*:*:*:*:*:*
Configuration 4
AND
   cpe:2.3:o:siemens:cp_1543-1_firmware:1.1:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*
Configuration 5
AND
   cpe:2.3:o:siemens:simatic_s7-1500_firmware:1.5:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*
Configuration 6
AND
   cpe:2.3:o:siemens:simatic_s7-1500t_firmware:1.5:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:siemens:simatic_s7-1500t:-:*:*:*:*:*:*:*
Configuration 7
cpe:2.3:a:siemens:elan-8.2:*:*:*:*:*:*:*:* < 8.3.3
cpe:2.3:a:siemens:wincc_open_architecture:3.12:*:*:*:*:*:*:*
Configuration 8
AND
   cpe:2.3:o:intellian:v100_firmware:1.20:*:*:*:*:*:*:*
   cpe:2.3:o:intellian:v100_firmware:1.21:*:*:*:*:*:*:*
   cpe:2.3:o:intellian:v100_firmware:1.24:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:intellian:v100:-:*:*:*:*:*:*:*
Configuration 9
AND
   cpe:2.3:o:intellian:v60_firmware:1.15:*:*:*:*:*:*:*
   cpe:2.3:o:intellian:v60_firmware:1.25:*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:intellian:v60:-:*:*:*:*:*:*:*
Configuration 10
cpe:2.3:a:mitel:micollab:6.0:*:*:*:*:*:*:*
cpe:2.3:a:mitel:micollab:7.0:*:*:*:*:*:*:*
cpe:2.3:a:mitel:micollab:7.1:*:*:*:*:*:*:*
cpe:2.3:a:mitel:micollab:7.2:*:*:*:*:*:*:*
cpe:2.3:a:mitel:micollab:7.3:*:*:*:*:*:*:*
cpe:2.3:a:mitel:micollab:7.3.0.104:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoice:1.1.2.5:*:*:*:*:lync:*:*
cpe:2.3:a:mitel:mivoice:1.1.3.3:*:*:*:*:skype_for_business:*:*
cpe:2.3:a:mitel:mivoice:1.2.0.11:*:*:*:*:skype_for_business:*:*
cpe:2.3:a:mitel:mivoice:1.3.2.2:*:*:*:*:skype_for_business:*:*
cpe:2.3:a:mitel:mivoice:1.4.0.102:*:*:*:*:skype_for_business:*:*
Configuration 11
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Configuration 12
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
Configuration 13
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
Configuration 14
cpe:2.3:a:redhat:gluster_storage:2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Configuration 15
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Configuration 16
AND
   cpe:2.3:o:ricon:s9922l_firmware:16.10.3(3794):*:*:*:*:*:*:*
  Running on/with
  cpe:2.3:h:ricon:s9922l:1.0:*:*:*:*:*:*:*
Configuration 17
cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.1:*:*:*:*:*:*:*
Configuration 18
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* >= 6.0.0 < 6.0.3


REMEDIATION


Patch

Url
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0...
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883a...
https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c1...
https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b40...
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3...
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0...
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883a...
https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c1...
https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b40...
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3...


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
https://github.com/sensepost/heartbleed-poc
https://github.com/0x90/CVE-2014-0160
https://github.com/froyo75/Heartbleed_Dockerfile_with_Nginx
https://github.com/GuillermoEscobero/heartbleed
https://github.com/undacmic/heartbleed-proof-of-concept

Other Nist (github, ...)

Url
http://www.exploit-db.com/exploits/32745
http://www.exploit-db.com/exploits/32764
https://gist.github.com/chapmajs/10473815
https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html
https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-atta...
http://www.exploit-db.com/exploits/32745
http://www.exploit-db.com/exploits/32764
https://gist.github.com/chapmajs/10473815
https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html
https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-atta...


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
540 Overread Buffers
High