Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0160

Опубликовано: 07 апр. 2014
Источник: debian
EPSS Критический

Описание

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensslfixed1.0.1g-1package
opensslnot-affectedsqueezepackage

Примечания

  • fix: http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=96db902

  • http://www.openssl.org/news/secadv/20140407.txt

  • system reboot is recommended after the upgrade

EPSS

Процентиль: 100%
0.94436
Критический

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 11 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

redhat
больше 11 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
nvd
больше 11 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
github
больше 3 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

oracle-oval
больше 11 лет назад

ELSA-2014-0376: openssl security update (IMPORTANT)

EPSS

Процентиль: 100%
0.94436
Критический