Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-0376

Опубликовано: 07 апр. 2014
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2014-0376: openssl security update (IMPORTANT)

[1.0.1e-16.7]

  • fix CVE-2014-0160 - information disclosure in TLS heartbeat extension

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

openssl

1.0.1e-16.el6_5.7

openssl-devel

1.0.1e-16.el6_5.7

openssl-perl

1.0.1e-16.el6_5.7

openssl-static

1.0.1e-16.el6_5.7

Oracle Linux i686

openssl

1.0.1e-16.el6_5.7

openssl-devel

1.0.1e-16.el6_5.7

openssl-perl

1.0.1e-16.el6_5.7

openssl-static

1.0.1e-16.el6_5.7

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 11 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

redhat
больше 11 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
nvd
больше 11 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
debian
больше 11 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1 ...

CVSS3: 7.5
github
больше 3 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.