ID SOL15724 Type f5 Reporter f5 Modified 2014-10-23T00:00:00
Description
Recommended Action
If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the table does not list any version in the column, then no upgrade candidate currently exists.
Supplemental Information
SOL9970: Subscribing to email notifications regarding F5 products
SOL9957: Creating a custom RSS feed to view new and updated documents.
SOL4602: Overview of the F5 security vulnerability response policy
SOL4918: Overview of the F5 critical issue hotfix policy
{"reporter": "f5", "published": "2014-10-23T00:00:00", "cvelist": ["CVE-2014-3568"], "title": "SOL15724 - OpenSSL vulnerability CVE-2014-3568", "objectVersion": "1.2", "type": "f5", "hash": "3ad57629d7c6f29aba3de74b5a0c19fa743dab85d8362280c1b15b50b9c5332f", "href": "http://support.f5.com/kb/en-us/solutions/public/15000/700/sol15724.html", "bulletinFamily": "software", "hashmap": [{"hash": "b1ea7cafd5315c3469f1558bb3c113b1", "key": "affectedSoftware"}, {"hash": "f9fa10ba956cacf91d7878861139efb9", "key": "bulletinFamily"}, {"hash": "fc71e1d0e0505fdb6ed11e662c91e26b", "key": "cvelist"}, {"hash": "6e9bdd2021503689a2ad9254c9cdf2b3", "key": "cvss"}, {"hash": "0cadbe26d54829599898c345f72f8173", "key": "description"}, {"hash": "71aebd857bef5b73b35a823b97739c34", "key": "href"}, {"hash": "2774b3dd38a60a3b8bdc7240222470fa", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "2774b3dd38a60a3b8bdc7240222470fa", "key": "published"}, {"hash": "5e946afe8909125e74f726876ce55bdf", "key": "references"}, {"hash": "74ce2e1a498f2fa27b5542040be774dc", "key": "reporter"}, {"hash": "ba2f60cc6c20eb76e743e0a444cb3646", "key": "title"}, {"hash": "74ce2e1a498f2fa27b5542040be774dc", "key": "type"}, {"hash": "cfcd208495d565ef66e7dff9f98764da", "key": "viewCount"}], "history": [], "enchantments": {"vulnersScore": 5.0}, "modified": "2014-10-23T00:00:00", "viewCount": 0, "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "edition": 1, "affectedSoftware": [{"operator": "le", "name": "ARX", "version": "6.4.0"}], "references": ["https://support.f5.com/kb/en-us/solutions/public/9000/900/sol9970.html", "https://support.f5.com/kb/en-us/solutions/public/4000/900/sol4918.html", "https://support.f5.com/kb/en-us/solutions/public/4000/600/sol4602.html", "https://support.f5.com/kb/en-us/solutions/public/9000/900/sol9957.html"], "id": "SOL15724", "lastseen": "2016-09-26T17:23:19", "description": "Recommended Action\n\nIf the previous table lists a version in the **Versions known to be not vulnerable** column, you can eliminate this vulnerability by upgrading to the listed version. If the table does not list any version in the column, then no upgrade candidate currently exists.\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents.\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL4918: Overview of the F5 critical issue hotfix policy\n"}
{"result": {"cve": [{"id": "CVE-2014-3568", "type": "cve", "title": "CVE-2014-3568", "description": "OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.", "published": "2014-10-18T21:55:13", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3568", "cvelist": ["CVE-2014-3568"], "lastseen": "2017-11-15T11:55:25"}], "openssl": [{"id": "OPENSSL:CVE-2014-3568", "type": "openssl", "title": "Vulnerability in OpenSSL (CVE-2014-3568)", "description": "When OpenSSL is configured with \"no-ssl3\" as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be configured to send them. Reported by Akamai Technologies.", "published": "2014-10-15T00:00:00", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.openssl.org/news/vulnerabilities.html", "cvelist": ["CVE-2014-3568"], "lastseen": "2016-09-26T17:22:34"}], "f5": [{"id": "F5:K16013", "type": "f5", "title": "OpenSSL vulnerability CVE-2014-3569", "description": " \n\n\nThe ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix. ([CVE-2014-3569](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3569>)) \n\n\nImpact \n\n\nNone\n\nIf the previous table lists a version in the **Versions known to be not vulnerable** column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.\n\nF5 is responding to this vulnerability as determined by the parameters defined in [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>).\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n", "published": "2015-01-29T03:58:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://support.f5.com/csp/article/K16013", "cvelist": ["CVE-2014-3568", "CVE-2014-3569"], "lastseen": "2017-10-12T02:11:04"}, {"id": "SOL16013", "type": "f5", "title": "SOL16013 - OpenSSL vulnerability CVE-2014-3569", "description": "**Note**: While the F5 products listed in the table may contain a version of OpenSSL that is affected by this vulnerability, those OpenSSL versions are not compiled with the vulnerable option on the F5 products. \n\n\nRecommended Action\n\nIf the previous table lists a version in the **Versions known to be not vulnerable** column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.\n\nF5 is responding to this vulnerability as determined by the parameters defined in SOL4602: Overview of the F5 security vulnerability response policy.\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4602: Overview of the F5 security vulnerability response policy\n", "published": "2015-01-28T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://support.f5.com/kb/en-us/solutions/public/16000/000/sol16013.html", "cvelist": ["CVE-2014-3568", "CVE-2014-3569"], "lastseen": "2016-11-09T00:09:51"}], "suse": [{"id": "SUSE-SU-2014:1409-1", "type": "suse", "title": "Security update for OpenSSL (important)", "description": "This OpenSSL update fixes the following issues:\n\n * Build option no-ssl3 is incomplete (CVE-2014-3568)\n * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)\n\n Security Issues:\n\n * CVE-2014-3566\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566</a>>\n * CVE-2014-3568\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568</a>>\n", "published": "2014-11-12T19:05:00", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00010.html", "cvelist": ["CVE-2014-3566", "CVE-2014-3568"], "lastseen": "2016-09-04T12:46:50"}, {"id": "SUSE-SU-2014:1387-1", "type": "suse", "title": "Security update for OpenSSL (important)", "description": "This OpenSSL update fixes the following issues:\n\n * Session Ticket Memory Leak (CVE-2014-3567)\n * Build option no-ssl3 is incomplete ((CVE-2014-3568)\n * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)\n\n Security Issues:\n\n * CVE-2014-3567\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567</a>>\n * CVE-2014-3566\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566</a>>\n * CVE-2014-3568\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568</a>>\n", "published": "2014-11-11T01:04:46", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00007.html", "cvelist": ["CVE-2014-3566", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2016-09-04T11:48:25"}, {"id": "SUSE-SU-2014:1387-2", "type": "suse", "title": "Security update for OpenSSL (important)", "description": "This OpenSSL update fixes the following issues:\n\n * Session Ticket Memory Leak (CVE-2014-3567)\n * Build option no-ssl3 is incomplete (CVE-2014-3568)\n * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)\n\n Security Issues:\n\n * CVE-2014-3567\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567</a>>\n * CVE-2014-3566\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566</a>>\n * CVE-2014-3568\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568</a>>\n", "published": "2014-11-13T01:04:46", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00012.html", "cvelist": ["CVE-2014-3566", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2016-09-04T12:42:58"}, {"id": "SUSE-SU-2014:1361-1", "type": "suse", "title": "Security update for OpenSSL (important)", "description": "This OpenSSL update fixes the following issues:\n\n * Session Ticket Memory Leak (CVE-2014-3567)\n * Build option no-ssl3 is incomplete (CVE-2014-3568)\n * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)\n\n Security Issues:\n\n * CVE-2014-3567\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567</a>>\n * CVE-2014-3566\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566</a>>\n * CVE-2014-3568\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568</a>>\n", "published": "2014-11-05T23:04:47", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html", "cvelist": ["CVE-2014-3566", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2016-09-04T11:27:16"}, {"id": "SUSE-SU-2014:1386-1", "type": "suse", "title": "Security update for OpenSSL (important)", "description": "This OpenSSL update fixes the following issues:\n\n * Session Ticket Memory Leak (CVE-2014-3567)\n * Build option no-ssl3 is incomplete ((CVE-2014-3568)\n * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)\n\n Security Issues:\n\n * CVE-2014-3513\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513</a>>\n * CVE-2014-3567\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567</a>>\n * CVE-2014-3566\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566</a>>\n * CVE-2014-3568\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568</a>>\n", "published": "2014-11-11T00:05:06", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00006.html", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2016-09-04T11:50:20"}, {"id": "SUSE-SU-2014:1357-1", "type": "suse", "title": "Security update for openssl1 (important)", "description": "This OpenSSL update fixes the following issues:\n\n * SRTP Memory Leak (CVE-2014-3513)\n * Session Ticket Memory Leak (CVE-2014-3567)\n * Build option no-ssl3 is incomplete (CVE-2014-3568)\n * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)\n\n Security Issues:\n\n * CVE-2014-3513\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513</a>>\n * CVE-2014-3567\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567</a>>\n * CVE-2014-3566\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566</a>>\n * CVE-2014-3568\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568</a>>\n", "published": "2014-11-04T23:04:45", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2016-09-04T11:46:54"}, {"id": "OPENSUSE-SU-2014:1331-1", "type": "suse", "title": "update for openssl (important)", "description": "The following issues were fixed in this release:\n\n CVE-2014-3566: SSLv3 POODLE attack (bnc#901223) CVE-2014-3513,\n CVE-2014-3567: DTLS memory leak and session ticket memory leak\n\n", "published": "2014-10-29T16:05:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2016-09-04T12:42:58"}, {"id": "SUSE-SU-2015:0578-1", "type": "suse", "title": "Security update for compat-openssl097g (important)", "description": "OpenSSL has been updated to fix various security issues:\n\n *\n\n CVE-2014-3568: The build option no-ssl3 was incomplete.\n\n *\n\n CVE-2014-3566: Support for TLS_FALLBACK_SCSV was added.\n\n *\n\n CVE-2014-3508: An information leak in pretty printing functions was\n fixed.\n\n *\n\n CVE-2013-0166: A OCSP bad key DoS attack was fixed.\n\n *\n\n CVE-2013-0169: An SSL/TLS CBC plaintext recovery attack was fixed.\n\n *\n\n CVE-2014-3470: Anonymous ECDH denial of service was fixed.\n\n *\n\n CVE-2014-0224: A SSL/TLS MITM vulnerability was fixed.\n\n *\n\n CVE-2014-3570: Bignum squaring (BN_sqr) may have produced incorrect\n results on some platforms, including x86_64.\n\n *\n\n CVE-2014-3572: Don't accept a handshake using an ephemeral ECDH\n ciphersuites with the server key exchange message omitted.\n\n *\n\n CVE-2014-8275: Fixed various certificate fingerprint issues.\n\n *\n\n CVE-2015-0204: Only allow ephemeral RSA keys in export ciphersuites\n\n *\n\n CVE-2015-0205: A fix was added to prevent use of DH client\n certificates without sending certificate verify message.\n\n *\n\n CVE-2015-0286: A segmentation fault in ASN1_TYPE_cmp was fixed that\n could be exploited by attackers when e.g. client authentication is used.\n This could be exploited over SSL connections.\n\n *\n\n CVE-2015-0287: A ASN.1 structure reuse memory corruption was fixed.\n This problem can not be exploited over regular SSL connections, only if\n specific client programs use specific ASN.1 routines.\n\n *\n\n CVE-2015-0288: A X509_to_X509_REQ NULL pointer dereference was\n fixed, which could lead to crashes. This function is not commonly used,\n and not reachable over SSL methods.\n\n *\n\n CVE-2015-0289: Several PKCS7 NULL pointer dereferences were fixed,\n which could lead to crashes of programs using the PKCS7 APIs. The SSL apis\n do not use those by default.\n\n *\n\n CVE-2015-0292: Various issues in base64 decoding were fixed, which\n could lead to crashes with memory corruption, for instance by using\n attacker supplied PEM data.\n\n *\n\n CVE-2015-0293: Denial of service via reachable assert in SSLv2\n servers, could be used by remote attackers to terminate the server\n process. Note that this requires SSLv2 being allowed, which is not the\n default.\n\n", "published": "2015-03-24T00:05:09", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", "cvelist": ["CVE-2013-0166", "CVE-2014-3508", "CVE-2014-3566", "CVE-2014-3572", "CVE-2013-0169", "CVE-2015-0286", "CVE-2015-0288", "CVE-2014-0224", "CVE-2014-8275", "CVE-2014-3570", "CVE-2014-3470", "CVE-2015-0293", "CVE-2015-0204", "CVE-2015-0287", "CVE-2015-0289", "CVE-2014-3568", "CVE-2015-0292", "CVE-2015-0205"], "lastseen": "2016-09-04T11:23:40"}, {"id": "OPENSUSE-SU-2016:0640-1", "type": "suse", "title": "Security update for libopenssl0_9_8 (important)", "description": "This update for libopenssl0_9_8 fixes the following issues:\n\n - CVE-2016-0800 aka the "DROWN" attack (bsc#968046): OpenSSL was\n vulnerable to a cross-protocol attack that could lead to decryption of\n TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites\n as a Bleichenbacher RSA padding oracle.\n\n This update changes the openssl library to:\n\n * Disable SSLv2 protocol support by default.\n\n This can be overridden by setting the environment variable\n "OPENSSL_ALLOW_SSL2" or by using SSL_CTX_clear_options using the\n SSL_OP_NO_SSLv2 flag.\n\n Note that various services and clients had already disabled SSL\n protocol 2 by default previously.\n\n * Disable all weak EXPORT ciphers by default. These can be reenabled if\n required by old legacy software using the environment variable\n "OPENSSL_ALLOW_EXPORT".\n\n - CVE-2016-0797 (bnc#968048): The BN_hex2bn() and BN_dec2bn() functions\n had a bug that could result in an attempt to de-reference a NULL pointer\n leading to crashes. This could have security consequences if these\n functions were ever called by user applications with large untrusted\n hex/decimal data. Also, internal usage of these functions in OpenSSL\n uses data from config files or application command line arguments. If\n user developed applications generated config file data based on\n untrusted data, then this could have had security consequences as well.\n\n - CVE-2016-0799 (bnc#968374) On many 64 bit systems, the internal fmtstr()\n and doapr_outch() functions could miscalculate the length of a string\n and attempt to access out-of-bounds memory locations. These problems\n could have enabled attacks where large amounts of untrusted data is\n passed to the BIO_*printf functions. If applications use these functions\n in this way then they could have been vulnerable. OpenSSL itself uses\n these functions when printing out human-readable dumps of ASN.1 data.\n Therefore applications that print this data could have been vulnerable\n if the data is from untrusted sources. OpenSSL command line applications\n could also have been vulnerable when they print out ASN.1 data, or if\n untrusted data is passed as command line arguments. Libssl is not\n considered directly vulnerable.\n\n\n - The package was updated to 0.9.8zh:\n * fixes many security vulnerabilities (not seperately listed):\n CVE-2015-3195, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790,\n CVE-2015-1792, CVE-2015-1791, CVE-2015-0286, CVE-2015-0287,\n CVE-2015-0289, CVE-2015-0293, CVE-2015-0209, CVE-2015-0288,\n CVE-2014-3571, CVE-2014-3569, CVE-2014-3572, CVE-2015-0204,\n CVE-2014-8275, CVE-2014-3570, CVE-2014-3567, CVE-2014-3568,\n CVE-2014-3566, CVE-2014-3510, CVE-2014-3507, CVE-2014-3506,\n CVE-2014-3505, CVE-2014-3508, CVE-2014-0224, CVE-2014-0221,\n CVE-2014-0195, CVE-2014-3470, CVE-2014-0076, CVE-2013-0169,\n CVE-2013-0166\n\n - avoid running OPENSSL_config twice. This avoids breaking engine loading.\n (boo#952871, boo#967787)\n\n - fix CVE-2015-3197 (boo#963415)\n * SSLv2 doesn't block disabled ciphers\n\n", "published": "2016-03-03T14:11:44", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", "cvelist": ["CVE-2013-0166", "CVE-2014-3505", "CVE-2014-3508", "CVE-2015-1792", "CVE-2014-3566", "CVE-2015-3197", "CVE-2014-3572", "CVE-2015-1789", "CVE-2013-0169", "CVE-2015-0286", "CVE-2014-3507", "CVE-2015-3195", "CVE-2014-3571", "CVE-2014-0076", "CVE-2016-0799", "CVE-2015-0288", "CVE-2014-0224", "CVE-2014-8275", "CVE-2016-0797", "CVE-2014-3570", "CVE-2014-3470", "CVE-2014-3506", "CVE-2015-0293", "CVE-2015-1788", "CVE-2014-0195", "CVE-2015-0209", "CVE-2014-3567", "CVE-2015-0204", "CVE-2016-0800", "CVE-2015-1790", "CVE-2014-3510", "CVE-2015-0287", "CVE-2015-0289", "CVE-2014-3568", "CVE-2014-3569", "CVE-2015-1791", "CVE-2014-0221"], "lastseen": "2016-09-04T12:32:46"}], "openvas": [{"id": "OPENVAS:1361412562310120187", "type": "openvas", "title": "Amazon Linux Local Check: ALAS-2014-427", "description": "Amazon Linux Local Security Checks", "published": "2015-09-08T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120187", "cvelist": ["CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-08-01T10:48:47"}, {"id": "OPENVAS:1361412562310105157", "type": "openvas", "title": "McAfee Email Gateway - Three SSLv3 Vulnerabilities", "description": "McAfee Email Gateway is vulnerable to one or more of the three Open Secure\nSockets Layer (OpenSSL) 3.0 (SSLv3) vulnerabilities.", "published": "2015-01-07T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105157", "cvelist": ["CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-07-24T12:53:20"}, {"id": "OPENVAS:1361412562310850800", "type": "openvas", "title": "SuSE Update for OpenSSL SUSE-SU-2014:1361-1 (OpenSSL)", "description": "Check the version of OpenSSL", "published": "2015-10-13T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850800", "cvelist": ["CVE-2014-3566", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-12-12T11:15:49"}, {"id": "OPENVAS:1361412562310850875", "type": "openvas", "title": "SuSE Update for OpenSSL SUSE-SU-2014:1386-1 (OpenSSL)", "description": "Check the version of OpenSSL", "published": "2015-10-16T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850875", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-12-12T11:15:35"}, {"id": "OPENVAS:703053", "type": "openvas", "title": "Debian Security Advisory DSA 3053-1 (openssl - security update)", "description": "Several vulnerabilities have been found in OpenSSL, the Secure Sockets\nLayer library and toolkit.\n\nCVE-2014-3513 \nA memory leak flaw was found in the way OpenSSL parsed the DTLS Secure\nReal-time Transport Protocol (SRTP) extension data. A remote attacker\ncould send multiple specially crafted handshake messages to exhaust\nall available memory of an SSL/TLS or DTLS server.\n\nCVE-2014-3566 (", "published": "2014-10-16T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=703053", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-08-01T10:49:16"}, {"id": "OPENVAS:1361412562310850621", "type": "openvas", "title": "SuSE Update for update openSUSE-SU-2014:1331-1 (update)", "description": "Check the version of update", "published": "2014-10-30T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850621", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-12-12T11:10:27"}, {"id": "OPENVAS:1361412562310703053", "type": "openvas", "title": "Debian Security Advisory DSA 3053-1 (openssl - security update)", "description": "Several vulnerabilities have been found in OpenSSL, the Secure Sockets\nLayer library and toolkit.\n\nCVE-2014-3513 \nA memory leak flaw was found in the way OpenSSL parsed the DTLS Secure\nReal-time Transport Protocol (SRTP) extension data. A remote attacker\ncould send multiple specially crafted handshake messages to exhaust\nall available memory of an SSL/TLS or DTLS server.\n\nCVE-2014-3566 (", "published": "2014-10-16T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703053", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2018-04-06T11:13:18"}, {"id": "OPENVAS:1361412562310120456", "type": "openvas", "title": "Amazon Linux Local Check: ALAS-2015-469", "description": "Amazon Linux Local Security Checks", "published": "2015-09-08T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120456", "cvelist": ["CVE-2014-3572", "CVE-2015-0206", "CVE-2014-3571", "CVE-2014-8275", "CVE-2014-3570", "CVE-2015-0204", "CVE-2014-3568", "CVE-2015-0205", "CVE-2014-3569"], "lastseen": "2017-07-24T12:52:30"}, {"id": "OPENVAS:1361412562310105191", "type": "openvas", "title": "VMSA-2015-0001: VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address security issues (remote check)", "description": "VMware vCenter Server, ESXi, Workstation, Player and Fusion address several security issues.", "published": "2015-01-30T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105191", "cvelist": ["CVE-2014-3566", "CVE-2015-1044", "CVE-2014-3513", "CVE-2014-8370", "CVE-2014-3660", "CVE-2014-3567", "CVE-2014-3568", "CVE-2015-1043"], "lastseen": "2018-04-09T11:30:33"}, {"id": "OPENVAS:1361412562310105190", "type": "openvas", "title": "VMSA-2015-0001: VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address security issues", "description": "VMware vCenter Server, ESXi, Workstation, Player and Fusion address several security issues.", "published": "2015-01-30T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105190", "cvelist": ["CVE-2014-3566", "CVE-2015-1044", "CVE-2014-3513", "CVE-2014-8370", "CVE-2014-3660", "CVE-2014-3567", "CVE-2014-3568", "CVE-2015-1043"], "lastseen": "2018-04-09T11:28:48"}], "nessus": [{"id": "SUSE_SU-2014-1387-1.NASL", "type": "nessus", "title": "SUSE SLES10 Security Update : OpenSSL (SUSE-SU-2014:1387-1) (POODLE)", "description": "This OpenSSL update fixes the following issues :\n\n - Session Ticket Memory Leak (CVE-2014-3567)\n\n - Build option no-ssl3 is incomplete ((CVE-2014-3568)\n\n - Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2015-05-20T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=83641", "cvelist": ["CVE-2014-3566", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-10-29T13:34:17"}, {"id": "DEBIAN_DLA-81.NASL", "type": "nessus", "title": "Debian DLA-81-1 : openssl security update", "description": "Several vulnerabilities have been found in OpenSSL.\n\nCVE-2014-3566 ('POODLE')\n\nA flaw was found in the way SSL 3.0 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. \n\nThis update adds support for Fallback SCSV to mitigate this issue.\nThis does not fix the issue. The proper way to fix this is to disable SSL 3.0.\n\nCVE-2014-3567\n\nA memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server.\n\nCVE-2014-3568\n\nWhen OpenSSL is configured with 'no-ssl3' as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be configured to send them.\n\nNote that the package is Debian is not build with this option.\n\nCVE-2014-3569\n\nWhen openssl is build with the no-ssl3 option and a SSL v3 Client Hello is received the ssl method would be set to NULL which could later result in a NULL pointer dereference.\n\nNote that the package is Debian is not build with this option.\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2015-03-26T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=82226", "cvelist": ["CVE-2014-3567", "CVE-2014-3568", "CVE-2014-3569"], "lastseen": "2017-10-29T13:36:51"}, {"id": "ALA_ALAS-2014-427.NASL", "type": "nessus", "title": "Amazon Linux AMI : openssl (ALAS-2014-427)", "description": "A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server. (CVE-2014-3513)\n\nA memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server. (CVE-2014-3567)\n\nWhen OpenSSL is configured with 'no-ssl3' as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be\n\nconfigured to send them. (CVE-2014-3568)", "published": "2014-10-16T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=78485", "cvelist": ["CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2018-04-19T07:58:24"}, {"id": "SUSE_SU-2014-1512-1.NASL", "type": "nessus", "title": "SUSE SLED12 Security Update : compat-openssl098 (SUSE-SU-2014:1512-1) (POODLE)", "description": "compat-openssl098 was updated to fix three security issues.\n\nNOTE: this update alone DOESN'T FIX the POODLE SSL protocol vulnerability. OpenSSL only adds downgrade detection support for client applications. See https://www.suse.com/support/kb/doc.php?id=7015773 for mitigations.\n\nThese security issues were fixed :\n\n - Session ticket memory leak (CVE-2014-3567).\n\n - Fixed build option no-ssl3 (CVE-2014-3568).\n\n - Added support for TLS_FALLBACK_SCSV (CVE-2014-3566).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2015-05-20T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=83647", "cvelist": ["CVE-2014-3566", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-10-29T13:33:41"}, {"id": "OPENSSL_0_9_8ZC.NASL", "type": "nessus", "title": "OpenSSL 0.9.8 < 0.9.8zc Multiple Vulnerabilities (POODLE)", "description": "According to its banner, the remote web server uses a version of OpenSSL 0.9.8 prior to 0.9.8zc. The OpenSSL library is, therefore, affected by the following vulnerabilities :\n\n - An error exists related to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. A man-in-the-middle attacker can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. This is also known as the 'POODLE' issue. (CVE-2014-3566)\n\n - An error exists related to session ticket handling that can allow denial of service attacks via memory leaks.\n (CVE-2014-3567)\n\n - An error exists related to the build configuration process and the 'no-ssl3' build option that allows servers and clients to process insecure SSL 3.0 handshake messages. (CVE-2014-3568)", "published": "2014-10-17T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=78552", "cvelist": ["CVE-2014-3566", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-10-29T13:33:16"}, {"id": "SUSE_11_LIBOPENSSL-DEVEL-141024.NASL", "type": "nessus", "title": "SuSE 11.3 Security Update : OpenSSL (SAT Patch Number 9915)", "description": "This OpenSSL update fixes the following issues :\n\n - Session Ticket Memory Leak. (CVE-2014-3567)\n\n - Build option no-ssl3 is incomplete. (CVE-2014-3568)\n\n - Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)", "published": "2014-11-06T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=78886", "cvelist": ["CVE-2014-3566", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-10-29T13:33:54"}, {"id": "OPENSSL_1_0_0O.NASL", "type": "nessus", "title": "OpenSSL 1.0.0 < 1.0.1o Multiple Vulnerabilities (POODLE)", "description": "According to its banner, the remote web server uses a version of OpenSSL 1.0.0 prior to 1.0.0o. The OpenSSL library is, therefore, affected by the following vulnerabilities :\n\n - An error exists related to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. A man-in-the-middle attacker can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. This is also known as the 'POODLE' issue. (CVE-2014-3566)\n\n - An error exists related to session ticket handling that can allow denial of service attacks via memory leaks.\n (CVE-2014-3567)\n\n - An error exists related to the build configuration process and the 'no-ssl3' build option that allows servers and clients to process insecure SSL 3.0 handshake messages. (CVE-2014-3568)", "published": "2014-10-17T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=78553", "cvelist": ["CVE-2014-3566", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-10-29T13:36:35"}, {"id": "SOLARIS11_OPENSSL_20141104.NASL", "type": "nessus", "title": "Oracle Solaris Third-Party Patch Update : openssl (multiple_vulnerabilities_in_openssl6) (POODLE)", "description": "The remote Solaris system is missing necessary patches to address security updates :\n\n - Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message. (CVE-2014-3513)\n\n - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the 'POODLE' issue. (CVE-2014-3566)\n\n - Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.\n (CVE-2014-3567)\n\n - OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c. (CVE-2014-3568)", "published": "2015-01-19T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=80725", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-10-29T13:38:08"}, {"id": "STUNNEL_5_06.NASL", "type": "nessus", "title": "stunnel < 5.06 OpenSSL Multiple Vulnerabilities (POODLE)", "description": "The version of stunnel installed on the remote host is prior to version 5.06. It is, therefore, affected by the following vulnerabilities in the bundled OpenSSL library :\n\n - An error exists related to DTLS SRTP extension handling and specially crafted handshake messages that can allow denial of service attacks via memory leaks.\n (CVE-2014-3513)\n\n - An error exists related to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. A man-in-the-middle attacker can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. This is also known as the 'POODLE' issue. (CVE-2014-3566)\n\n - An error exists related to session ticket handling that can allow denial of service attacks via memory leaks.\n (CVE-2014-3567)\n\n - An error exists related to the build configuration process and the 'no-ssl3' build option that allows servers and clients to process insecure SSL 3.0 handshake messages. (CVE-2014-3568)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "published": "2014-10-20T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=78584", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-10-29T13:43:53"}, {"id": "IBM_GPFS_ISG3T1021546_WINDOWS.NASL", "type": "nessus", "title": "IBM General Parallel File System Multiple Vulnerabilities (Windows) (POODLE)", "description": "A version of IBM General Parallel File System (GPFS) 3.5.x prior to 3.5.0.21 is installed on the remote Windows host. It is, therefore, affected by the following OpenSSL related vulnerabilities :\n\n - An error exists related to DTLS SRTP extension handling and specially crafted handshake messages that can allow denial of service attacks via memory leaks.\n (CVE-2014-3513)\n\n - An error exists related to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode.\n Man-in-the-middle attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. This is also known as the 'POODLE' issue. (CVE-2014-3566)\n\n - An error exists related to session ticket handling that can allow denial of service attacks via memory leaks.\n (CVE-2014-3567)\n\n - An error exists related to the build configuration process and the 'no-ssl3' build option that allows servers and clients to process insecure SSL 3.0 handshake messages. (CVE-2014-3568)", "published": "2015-01-21T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=80885", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2017-10-29T13:37:27"}], "amazon": [{"id": "ALAS-2014-427", "type": "amazon", "title": "Important: openssl", "description": "**Issue Overview:**\n\nA memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server. ([CVE-2014-3513 __](<https://access.redhat.com/security/cve/CVE-2014-3513>))\n\nA memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server. ([CVE-2014-3567 __](<https://access.redhat.com/security/cve/CVE-2014-3567>))\n\nWhen OpenSSL is configured with \"no-ssl3\" as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be \nconfigured to send them. ([CVE-2014-3568 __](<https://access.redhat.com/security/cve/CVE-2014-3568>))\n\n \n**Affected Packages:** \n\n\nopenssl\n\n \n**Issue Correction:** \nRun _yum update openssl_ to update your system. Note that you may need to run _yum clean all_ first. \n\n \n**New Packages:**\n \n \n i686: \n openssl-1.0.1j-1.80.amzn1.i686 \n openssl-debuginfo-1.0.1j-1.80.amzn1.i686 \n openssl-devel-1.0.1j-1.80.amzn1.i686 \n openssl-static-1.0.1j-1.80.amzn1.i686 \n openssl-perl-1.0.1j-1.80.amzn1.i686 \n \n src: \n openssl-1.0.1j-1.80.amzn1.src \n \n x86_64: \n openssl-1.0.1j-1.80.amzn1.x86_64 \n openssl-perl-1.0.1j-1.80.amzn1.x86_64 \n openssl-debuginfo-1.0.1j-1.80.amzn1.x86_64 \n openssl-static-1.0.1j-1.80.amzn1.x86_64 \n openssl-devel-1.0.1j-1.80.amzn1.x86_64 \n \n \n", "published": "2014-10-15T16:14:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://alas.aws.amazon.com/ALAS-2014-427.html", "cvelist": ["CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2016-09-28T21:04:00"}, {"id": "ALAS-2015-469", "type": "amazon", "title": "Medium: openssl", "description": "**Issue Overview:**\n\nOpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.\n\nThe BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.\n\nThe ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.\n\nThe ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the [CVE-2014-3568 __](<https://access.redhat.com/security/cve/CVE-2014-3568>) fix.\n\nOpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.\n\nThe ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.\n\nThe ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role.\n\nMemory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.\n\n \n**Affected Packages:** \n\n\nopenssl\n\n \n**Issue Correction:** \nRun _yum update openssl_ to update your system. \n\n \n**New Packages:**\n \n \n i686: \n openssl-debuginfo-1.0.1k-1.82.amzn1.i686 \n openssl-devel-1.0.1k-1.82.amzn1.i686 \n openssl-perl-1.0.1k-1.82.amzn1.i686 \n openssl-1.0.1k-1.82.amzn1.i686 \n openssl-static-1.0.1k-1.82.amzn1.i686 \n \n src: \n openssl-1.0.1k-1.82.amzn1.src \n \n x86_64: \n openssl-devel-1.0.1k-1.82.amzn1.x86_64 \n openssl-static-1.0.1k-1.82.amzn1.x86_64 \n openssl-1.0.1k-1.82.amzn1.x86_64 \n openssl-perl-1.0.1k-1.82.amzn1.x86_64 \n openssl-debuginfo-1.0.1k-1.82.amzn1.x86_64 \n \n \n", "published": "2015-01-11T12:36:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://alas.aws.amazon.com/ALAS-2015-469.html", "cvelist": ["CVE-2014-3572", "CVE-2015-0206", "CVE-2014-3571", "CVE-2014-8275", "CVE-2014-3570", "CVE-2015-0204", "CVE-2014-3568", "CVE-2015-0205", "CVE-2014-3569"], "lastseen": "2016-09-28T21:04:15"}], "debian": [{"id": "DSA-3053", "type": "debian", "title": "openssl -- security update", "description": "Several vulnerabilities have been found in OpenSSL, the Secure Sockets Layer library and toolkit.\n\n * [CVE-2014-3513](<https://security-tracker.debian.org/tracker/CVE-2014-3513>)\n\nA memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server.\n\n * [CVE-2014-3566 (\"POODLE\")](<https://security-tracker.debian.org/tracker/CVE-2014-3566>)\n\nA flaw was found in the way SSL 3.0 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. \n\nThis update adds support for Fallback SCSV to mitigate this issue.\n\n * [CVE-2014-3567](<https://security-tracker.debian.org/tracker/CVE-2014-3567>)\n\nA memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server. \n\n * [CVE-2014-3568](<https://security-tracker.debian.org/tracker/CVE-2014-3568>)\n\nWhen OpenSSL is configured with \"no-ssl3\" as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be configured to send them.\n\nFor the stable distribution (wheezy), these problems have been fixed in version 1.0.1e-2+deb7u13.\n\nFor the unstable distribution (sid), these problems have been fixed in version 1.0.1j-1.\n\nWe recommend that you upgrade your openssl packages.", "published": "2014-10-16T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://www.debian.org/security/dsa-3053", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2016-09-02T18:25:35"}], "slackware": [{"id": "SSA-2014-288-01", "type": "slackware", "title": "openssl", "description": "New openssl packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,\nand -current to fix security issues.\n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n\npatches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz: Upgraded.\n (* Security fix *)\npatches/packages/openssl-1.0.1j-i486-1_slack14.1.txz: Upgraded.\n This update fixes several security issues:\n SRTP Memory Leak (CVE-2014-3513):\n A flaw in the DTLS SRTP extension parsing code allows an attacker, who\n sends a carefully crafted handshake message, to cause OpenSSL to fail\n to free up to 64k of memory causing a memory leak. This could be\n exploited in a Denial Of Service attack.\n Session Ticket Memory Leak (CVE-2014-3567):\n When an OpenSSL SSL/TLS/DTLS server receives a session ticket the\n integrity of that ticket is first verified. In the event of a session\n ticket integrity check failing, OpenSSL will fail to free memory\n causing a memory leak. By sending a large number of invalid session\n tickets an attacker could exploit this issue in a Denial Of Service\n attack.\n SSL 3.0 Fallback protection:\n OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications\n to block the ability for a MITM attacker to force a protocol\n downgrade.\n Some client applications (such as browsers) will reconnect using a\n downgraded protocol to work around interoperability bugs in older\n servers. This could be exploited by an active man-in-the-middle to\n downgrade connections to SSL 3.0 even if both sides of the connection\n support higher protocols. SSL 3.0 contains a number of weaknesses\n including POODLE (CVE-2014-3566).\n Build option no-ssl3 is incomplete (CVE-2014-3568):\n When OpenSSL is configured with "no-ssl3" as a build option, servers\n could accept and complete a SSL 3.0 handshake, and clients could be\n configured to send them.\n For more information, see:\n https://www.openssl.org/news/secadv_20141015.txt\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the "Get Slack" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated packages for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zc-i486-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.0.txz\n\nUpdated packages for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz\n\nUpdated packages for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zc-i486-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.1.txz\n\nUpdated packages for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz\n\nUpdated packages for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zc-i486-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.37.txz\n\nUpdated packages for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz\n\nUpdated packages for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1j-i486-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.0.txz\n\nUpdated packages for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1j-x86_64-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz\n\nUpdated packages for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1j-i486-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz\n\nUpdated packages for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1j-x86_64-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz\n\nUpdated packages for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1j-i486-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1j-i486-1.txz\n\nUpdated packages for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1j-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1j-x86_64-1.txz\n\n\nMD5 signatures:\n\nSlackware 13.0 packages:\n44d336a121b39296f0e6bbeeb283dd2b openssl-0.9.8zc-i486-1_slack13.0.txz\n8342cfb351e59ecf5ea6d8cba66f0040 openssl-solibs-0.9.8zc-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 packages:\n671f12535bdc10ab24388b713351aca2 openssl-0.9.8zc-x86_64-1_slack13.0.txz\n21e380284cdfab2fd15fffe2e0aed526 openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz\n\nSlackware 13.1 packages:\n64cb819f1e07522bd5d7ceedd0a9ab50 openssl-0.9.8zc-i486-1_slack13.1.txz\n5fe4e385b2251cfd7e8ae5963ec6cef1 openssl-solibs-0.9.8zc-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 packages:\n94feb6699d6f2cc7750a6b2e17ccaaa2 openssl-0.9.8zc-x86_64-1_slack13.1.txz\n2c17e4286509c29074ab0168367b851e openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz\n\nSlackware 13.37 packages:\n4483d91c776c7e23c59246c4e0aa24aa openssl-0.9.8zc-i486-1_slack13.37.txz\nfedd58eb19bc13c9dd88d947827a7370 openssl-solibs-0.9.8zc-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 packages:\n5d48ac1e9339efc35e304c7d48b2e762 openssl-0.9.8zc-x86_64-1_slack13.37.txz\n6f5e2b576259477c13f12cbed9be8804 openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz\n\nSlackware 14.0 packages:\n2b678160283bc696565dc8bd8b28c0eb openssl-1.0.1j-i486-1_slack14.0.txz\nf7762615c990713e9e86d4da962f1022 openssl-solibs-1.0.1j-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 packages:\n41010ca37d49b74e7d7dc3f1c6ddc57e openssl-1.0.1j-x86_64-1_slack14.0.txz\n40dc6f3de217279d6140c1efcc0d45c8 openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz\n\nSlackware 14.1 packages:\n024ecea55e22e47f9fbb4b81a7b72a51 openssl-1.0.1j-i486-1_slack14.1.txz\n0a575668bb41ec4c2160800611f7f627 openssl-solibs-1.0.1j-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 packages:\nd07fe289f7998a584c2b0d9810a8b9aa openssl-1.0.1j-x86_64-1_slack14.1.txz\n1ffc5d0c02b0c60cefa5cf9189bfc71d openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz\n\nSlackware -current packages:\n53c9f51a79460bbfc5dec5720317cd53 a/openssl-solibs-1.0.1j-i486-1.txz\ncc059aa63494f3b005a886c70bc3f5d6 n/openssl-1.0.1j-i486-1.txz\n\nSlackware x86_64 -current packages:\n500709555e652adcd84b4e02dfab4eeb a/openssl-solibs-1.0.1j-x86_64-1.txz\nc483ca9c450fa90a901ac013276ccc53 n/openssl-1.0.1j-x86_64-1.txz\n\n\nInstallation instructions:\n\nUpgrade the packages as root:\n > upgradepkg openssl-1.0.1j-i486-1_slack14.1.txz openssl-solibs-1.0.1j-i486-1_slack14.1.txz", "published": "2014-10-15T10:58:22", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.846452", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2018-02-02T18:11:37"}], "archlinux": [{"id": "ASA-201410-6", "type": "archlinux", "title": "openssl: denial of service / man-in-the-middle / poodle mitigation", "description": "SRTP Memory Leak (CVE-2014-3513)\n--------------------------------\n\nA flaw in the DTLS SRTP extension parsing code allows an attacker, who\nsends a carefully crafted handshake message, to cause OpenSSL to fail\nto free up to 64k of memory causing a memory leak. This could be\nexploited in a Denial Of Service attack. This issue affects OpenSSL\n1.0.1 server implementations for both SSL/TLS and DTLS regardless of\nwhether SRTP is used or configured. Implementations of OpenSSL that\nhave been compiled with OPENSSL_NO_SRTP defined are not affected.\n\nSession Ticket Memory Leak (CVE-2014-3567)\n------------------------------------------\n\nWhen an OpenSSL SSL/TLS/DTLS server receives a session ticket the\nintegrity of that ticket is first verified. In the event of a session\nticket integrity check failing, OpenSSL will fail to free memory\ncausing a memory leak. By sending a large number of invalid session\ntickets an attacker could exploit this issue in a Denial Of Service\nattack.\n\nBuild option no-ssl3 is incomplete (CVE-2014-3568)\n--------------------------------------------------\n\nWhen OpenSSL is configured with "no-ssl3" as a build option, servers\ncould accept and complete a SSL 3.0 handshake, and clients could be\nconfigured to send them.\n\nSSL 3.0 Fallback protection\n---------------------------\n\nOpenSSL has added support for TLS_FALLBACK_SCSV to allow applications\nto block the ability for a MITM attacker to force a protocol\ndowngrade.\n\nSome client applications (such as browsers) will reconnect using a\ndowngraded protocol to work around interoperability bugs in older\nservers. This could be exploited by an active man-in-the-middle to\ndowngrade connections to SSL 3.0 even if both sides of the connection\nsupport higher protocols. SSL 3.0 contains a number of weaknesses\nincluding POODLE (CVE-2014-3566).", "published": "2014-10-16T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://lists.archlinux.org/pipermail/arch-security/2014-October/000117.html", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2016-09-02T18:44:42"}], "freebsd": [{"id": "03175E62-5494-11E4-9CC1-BC5FF4FB5E7B", "type": "freebsd", "title": "OpenSSL -- multiple vulnerabilities", "description": "\nThe OpenSSL Project reports:\n\nA flaw in the DTLS SRTP extension parsing code allows an\n\t attacker, who sends a carefully crafted handshake message,\n\t to cause OpenSSL to fail to free up to 64k of memory causing\n\t a memory leak. This could be exploited in a Denial Of Service\n\t attack. This issue affects OpenSSL 1.0.1 server implementations\n\t for both SSL/TLS and DTLS regardless of whether SRTP is used\n\t or configured. Implementations of OpenSSL that have been\n\t compiled with OPENSSL_NO_SRTP defined are not affected.\n\t [CVE-2014-3513].\nWhen an OpenSSL SSL/TLS/DTLS server receives a session\n\t ticket the integrity of that ticket is first verified.\n\t In the event of a session ticket integrity check failing,\n\t OpenSSL will fail to free memory causing a memory leak.\n\t By sending a large number of invalid session tickets an\n\t attacker could exploit this issue in a Denial Of Service\n\t attack. [CVE-2014-3567].\nOpenSSL has added support for TLS_FALLBACK_SCSV to allow\n\t applications to block the ability for a MITM attacker to\n\t force a protocol downgrade.\nSome client applications (such as browsers) will reconnect\n\t using a downgraded protocol to work around interoperability\n\t bugs in older servers. This could be exploited by an active\n\t man-in-the-middle to downgrade connections to SSL 3.0 even\n\t if both sides of the connection support higher protocols.\n\t SSL 3.0 contains a number of weaknesses including POODLE\n\t [CVE-2014-3566].\nWhen OpenSSL is configured with \"no-ssl3\" as a build option,\n\t servers could accept and complete a SSL 3.0 handshake, and\n\t clients could be configured to send them. [CVE-2014-3568].\n\n", "published": "2014-10-15T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://vuxml.freebsd.org/freebsd/03175e62-5494-11e4-9cc1-bc5ff4fb5e7b.html", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2016-09-26T17:24:23"}], "kaspersky": [{"id": "KLA10359", "type": "kaspersky", "title": "\r KLA10359Vulnerability in Tableau\t\t\t ", "description": "### *CVSS*:\n7.1\n\n### *Detect date*:\n07/18/2014\n\n### *Severity*:\nHigh\n\n### *Description*:\nAn obsolete version of OpenSSL was found in Tableau. By exploiting this vulnerability malicious users can cause denial of service, obtain sensitive information and bypass security. This vulnerability can be exploited remotely.\n\n### *Affected products*:\nTableau server 8.1. versions 8.1.12 and earlier \nTableau server 8.2. versions 8.2.4 and earlier\n\n### *Solution*:\nUpdate to latest version\n\n### *Original advisories*:\n[Tableau changelog](<http://www.tableausoftware.com/support/releases>) \n\n\n### *Impacts*:\nOSI \n\n### *Related products*:\n[Tableau Server](<https://threats.kaspersky.com/en/product/Tableau-Server/>)\n\n### *CVE-IDS*:\n[CVE-2014-3568](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568>) \n[CVE-2014-3567](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567>) \n[CVE-2014-3513](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513>) \n[CVE-2014-3566](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566>)", "published": "2014-07-18T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://threats.kaspersky.com/en/vulnerability/KLA10359", "cvelist": ["CVE-2014-3566", "CVE-2014-3513", "CVE-2014-3567", "CVE-2014-3568"], "lastseen": "2018-03-30T14:11:52"}, {"id": "KLA10452", "type": "kaspersky", "title": "\r KLA10452Multiple vulnerabilities in VMware products\t\t\t ", "description": "### *CVSS*:\n7.1\n\n### *Detect date*:\n01/27/2015\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple serious vulnerabilities have been found in VMware products. Malicious users can exploit these vulnerabilities to gain privileges or cause denial of service.\n\n### *Affected products*:\nVMware Workstation 10 versions earlier than 10.0.5 \nVMware Player 6 versions earlier than 6.0.5 \nVMware Fusion 7 versions earlier than 7.0.1 \nVMware Fusion 6 versions earlier than 6.0.5 \nVMware vCenter Server 5.5 earlier than update 2d \nESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG \nESXi 5.1 without patch ESXi510-201404101-SG \nESXi 5.0 without patch ESXi500-201405101-SG\n\n### *Solution*:\nUpdate to latest version \n[Get VMware products](<https://my.vmware.com/web/vmware/downloads>)\n\n### *Original advisories*:\n[VMSA](<https://www.vmware.com/security/advisories/VMSA-2015-0001>) \n\n\n### *Impacts*:\nPE \n\n### *Related products*:\n[VMware Workstation](<https://threats.kaspersky.com/en/product/VMware-Workstation/>)\n\n### *CVE-IDS*:\n[CVE-2014-3660](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660>) \n[CVE-2014-3568](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568>) \n[CVE-2014-3567](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567>) \n[CVE-2014-3513](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513>) \n[CVE-2015-1044](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1044>) \n[CVE-2015-1043](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1043>) \n[CVE-2014-8370](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8370>) \n[CVE-2014-3566](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566>)", "published": "2015-01-27T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://threats.kaspersky.com/en/vulnerability/KLA10452", "cvelist": ["CVE-2014-3566", "CVE-2015-1044", "CVE-2014-3513", "CVE-2014-8370", "CVE-2014-3660", "CVE-2014-3567", "CVE-2014-3568", "CVE-2015-1043"], "lastseen": "2018-03-30T14:11:46"}], "vmware": [{"id": "VMSA-2015-0001", "type": "vmware", "title": "VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address security issues", "description": "**a. VMware ESXi, Workstation, Player, and Fusion host privilege escalation vulnerability**\n\nVMware ESXi, Workstation, Player and Fusion contain an arbitrary file write issue. Exploitation this issue may allow for privilege escalation on the host. \n \nThe vulnerability does not allow for privilege escalation from the guest Operating System to the host or vice-versa. This means that host memory can not be manipulated from the Guest Operating \nSystem. \n \n**Mitigation** \n \nFor ESXi to be affected, permissions must have been added to ESXi (or a vCenter Server managing it) for a virtual machine administrator role or greater. \n \nVMware would like to thank Shanon Olsson for reporting this issue to us through JPCERT. \n \nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2014-8370 to this issue. \n \nColumn 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.\n", "published": "2015-01-27T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.vmware.com/security/advisories/VMSA-2015-0001.html", "cvelist": ["CVE-2014-3566", "CVE-2015-1044", "CVE-2014-3513", "CVE-2014-8370", "CVE-2014-3660", "CVE-2014-3567", "CVE-2014-3568", "CVE-2015-1043"], "lastseen": "2016-09-04T11:19:27"}], "gentoo": [{"id": "GLSA-201412-39", "type": "gentoo", "title": "OpenSSL: Multiple vulnerabilities", "description": "### Background\n\nOpenSSL is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general purpose cryptography library. \n\n### Description\n\nMultiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker may be able to cause a Denial of Service condition, perform Man-in-the-Middle attacks, obtain sensitive information, or bypass security restrictions. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll OpenSSL 1.0.1 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-libs/openssl-1.0.1j\"\n \n\nAll OpenSSL 0.9.8 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-libs/openssl-0.9.8z_p2\"\n \n\nPackages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying these packages.", "published": "2014-12-26T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://security.gentoo.org/glsa/201412-39", "cvelist": ["CVE-2014-3505", "CVE-2013-6449", "CVE-2014-3507", "CVE-2014-3513", "CVE-2014-3511", "CVE-2014-3506", "CVE-2013-6450", "CVE-2014-3567", "CVE-2014-3512", "CVE-2014-3510", "CVE-2014-3568", "CVE-2014-3509", "CVE-2014-5139"], "lastseen": "2016-09-06T19:46:51"}]}}