CVE-2014-0160
07.04.2014, 22:55
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.Enginsight
Vendor | Product | Version |
---|---|---|
openssl | openssl | 1.0.1 ≤ 𝑥 < 1.0.1g |
filezilla-project | filezilla_server | 𝑥 < 0.9.44 |
siemens | application_processing_engine_firmware | 2.0 |
siemens | cp_1543-1_firmware | 1.1 |
siemens | simatic_s7-1500_firmware | 1.5 |
siemens | simatic_s7-1500t_firmware | 1.5 |
siemens | elan-8.2 | 𝑥 < 8.3.3 |
siemens | wincc_open_architecture | 3.12 |
intellian | v100_firmware | 1.20 |
intellian | v100_firmware | 1.21 |
intellian | v100_firmware | 1.24 |
intellian | v60_firmware | 1.15 |
intellian | v60_firmware | 1.25 |
mitel | micollab | 6.0 |
mitel | micollab | 7.0 |
mitel | micollab | 7.1 |
mitel | micollab | 7.2 |
mitel | micollab | 7.3 |
mitel | micollab | 7.3.0.104 |
mitel | mivoice | 1.1.2.5 |
mitel | mivoice | 1.1.3.3 |
mitel | mivoice | 1.2.0.11 |
mitel | mivoice | 1.3.2.2 |
mitel | mivoice | 1.4.0.102 |
opensuse | opensuse | 12.3 |
opensuse | opensuse | 13.1 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 12.10 |
canonical | ubuntu_linux | 13.10 |
redhat | gluster_storage | 2.1 |
redhat | storage | 2.1 |
redhat | virtualization | 6.0 |
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server_aus | 6.5 |
redhat | enterprise_linux_server_eus | 6.5 |
redhat | enterprise_linux_server_tus | 6.5 |
redhat | enterprise_linux_workstation | 6.0 |
debian | debian_linux | 6.0 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
ricon | s9922l_firmware | 16.10.3\(3794\) |
broadcom | symantec_messaging_gateway | 10.6.0 |
broadcom | symantec_messaging_gateway | 10.6.1 |
splunk | splunk | 6.0.0 ≤ 𝑥 < 6.0.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References
http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3