Lucene search

K
cve[email protected]CVE-2014-0160
HistoryApr 07, 2014 - 10:55 p.m.

CVE-2014-0160

2014-04-0722:55:03
CWE-125
web.nvd.nist.gov
3519
In Wild
10
cve-2014-0160
nvd
openssl
heartbleed
tls
dtls
security vulnerability

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

High

0.975 High

EPSS

Percentile

100.0%

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

Affected configurations

NVD
Node
opensslopensslRange1.0.11.0.1g
Node
filezilla-projectfilezilla_serverRange<0.9.44
Node
siemensapplication_processing_engine_firmwareMatch2.0
AND
siemensapplication_processing_engineMatch-
Node
siemenscp_1543-1_firmwareMatch1.1
AND
siemenscp_1543-1Match-
Node
siemenssimatic_s7-1500_firmwareMatch1.5
AND
siemenssimatic_s7-1500Match-
Node
siemenssimatic_s7-1500t_firmwareMatch1.5
AND
siemenssimatic_s7-1500tMatch-
Node
siemenselan-8.2Range<8.3.3
OR
siemenswincc_open_architectureMatch3.12
Node
intellianv100_firmwareMatch1.20
OR
intellianv100_firmwareMatch1.21
OR
intellianv100_firmwareMatch1.24
AND
intellianv100Match-
Node
intellianv60_firmwareMatch1.15
OR
intellianv60_firmwareMatch1.25
AND
intellianv60Match-
Node
mitelmicollabMatch6.0
OR
mitelmicollabMatch7.0
OR
mitelmicollabMatch7.1
OR
mitelmicollabMatch7.2
OR
mitelmicollabMatch7.3
OR
mitelmicollabMatch7.3.0.104
OR
mitelmivoiceMatch1.1.2.5lync
OR
mitelmivoiceMatch1.1.3.3skype_for_business
OR
mitelmivoiceMatch1.2.0.11skype_for_business
OR
mitelmivoiceMatch1.3.2.2skype_for_business
OR
mitelmivoiceMatch1.4.0.102skype_for_business
Node
opensuseopensuseMatch12.3
OR
opensuseopensuseMatch13.1
Node
canonicalubuntu_linuxMatch12.04esm
OR
canonicalubuntu_linuxMatch12.10
OR
canonicalubuntu_linuxMatch13.10
Node
fedoraprojectfedoraMatch19
OR
fedoraprojectfedoraMatch20
Node
redhatgluster_storageMatch2.1
OR
redhatstorageMatch2.1
OR
redhatvirtualizationMatch6.0
OR
redhatenterprise_linux_desktopMatch6.0
OR
redhatenterprise_linux_serverMatch6.0
OR
redhatenterprise_linux_server_ausMatch6.5
OR
redhatenterprise_linux_server_eusMatch6.5
OR
redhatenterprise_linux_server_tusMatch6.5
OR
redhatenterprise_linux_workstationMatch6.0
Node
debiandebian_linuxMatch6.0
OR
debiandebian_linuxMatch7.0
OR
debiandebian_linuxMatch8.0
Node
ricons9922l_firmwareMatch16.10.3\(3794\)
AND
ricons9922lMatch1.0
CPENameOperatorVersion
openssl:opensslopenssllt1.0.1g

References

Social References

More

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

High

0.975 High

EPSS

Percentile

100.0%