OpenSSL was updated to fix the following security vulnerabilities:
* SSL/TLS MITM vulnerability. (CVE-2014-0224)
* ECC private key can leak on 32 bit platforms. (CVE-2011-4354)
Further information can be found at
<a rel="nofollow" href="http://www.openssl.org/news/secadv_20140605.txt">http://www.openssl.org/news/secadv_20140605.txt</a>
<<a rel="nofollow" href="http://www.openssl.org/news/secadv_20140605.txt">http://www.openssl.org/news/secadv_20140605.txt</a>> .
Security Issues references:
* CVE-2014-0224
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224</a>>
* CVE-2011-4354
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4354">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4354</a>>
{"f5": [{"lastseen": "2016-09-26T17:23:05", "description": "Recommended action\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents.\n * SOL4602: Overview of the F5 security vulnerability response policy\n", "cvss3": {}, "published": "2014-07-17T00:00:00", "type": "f5", "title": "SOL15427 - OpenSSL vulnerability CVE-2011-4354", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-4354"], "modified": "2014-07-17T00:00:00", "id": "SOL15427", "href": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15427.html", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}}, {"lastseen": "2021-06-08T18:48:59", "description": "**Client-side components**Product| Versions known to be vulnerable| Versions known to be not vulnerable| Vulnerable component or feature \n---|---|---|--- \nBIG-IP LTM| 11.0.0 - 11.5.1 \n10.0.0 - 10.2.4| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4 \n11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP AAM| 11.4.0 - 11.5.1| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP AFM| 11.3.0 - 11.5.1| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP Analytics| 11.0.0 - 11.5.1| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4 \n11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP APM| 11.0.0 - 11.5.1 \n10.1.0 - 10.2.4| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4 \n11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP ASM| 11.0.0 - 11.5.1 \n10.0.0 - 10.2.4| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4 \n11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP DNS| None| 12.0.0| None \nBIG-IP Edge Gateway| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| 11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP GTM| 11.0.0 - 11.5.1 \n10.0.0 - 10.2.4| 11.6.0 \n11.5.1 HF3 \n11.5.0 HF4 \n11.2.1 HF15| Host-initiated SSL connections \nBIG-IP Link Controller| 11.0.0 - 11.5.1 \n10.0.0 - 10.2.4| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4 \n11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP PEM| 11.3.0 - 11.5.1| 11.5.1 HF3 \n11.5.0 HF4| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP PSM| 11.0.0 - 11.4.1 \n10.0.0 - 10.2.4| 11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP WebAccelerator| 11.0.0 - 11.3.0 \n10.0.0 - 10.2.4| 11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP WOM| 11.0.0 - 11.3.0 \n10.0.0 - 10.2.4| 11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nARX| None| 6.0.0 - 6.4.0| None \nEnterprise Manager| 2.0.0 - 2.3.0| None| Host-initiated SSL connections \nFirePass| 7.0.0 \n6.0.0 - 6.1.0| None| Host-initiated SSL connections \nBIG-IQ Cloud| 4.0.0 - 4.3.0| None| Host-initiated SSL connections \nBIG-IQ Device| 4.2.0 - 4.3.0| None| Host-initiated SSL connections \nBIG-IQ Security| 4.0.0 - 4.3.0| None| Host-initiated SSL connections \nLineRate| 2.3.0 - 2.3.1 \n2.2.0 - 2.2.4 \n1.6.0 - 1.6.3| None| Host-initiated SSL connections \nBIG-IP Edge Clients for Linux| 6035 - 7071| 7101.2014.0612.* \n7100.2014.0612.* \n7091.2014.0612.* \n7090.2014.0612.* \n7080.2014.0624.*| VPN \nBIG-IP Edge Client for MAC OS X| 6035 - 7071| 7101.2014.0612.* \n7100.2014.0612.* \n7091.2014.0612.* \n7090.2014.0612.* \n7080.2014.0624.*| VPN \nBIG-IP Edge Client for Windows| 7101.* - 7101.2014.0611.* \n7100.* - 7100.2014.0611.* \n7091.* - 7091.2014.0611.* \n7090.* - 7090.2014.0611.* \n7080.* - 7080.2014.0623.* \n6035 - 7071| 7101.2014.0612.1847 \n7100.2014.0612.1847 \n7091.2014.0612.1950 \n7090.2014.0612.1853 \n7080.2014.0624.2054| VPN (DTLS Only) \nBIG-IP Edge Client for iOS| 2.0.0 - 2.0.2 \n1.0.5 - 1.0.6| 2.0.3| VPN \nBIG-IP Edge Client for Android| 2.0.1 - 2.0.4| 2.0.5| VPN \n \nVulnerability Recommended Actions\n\nIf the previous table lists a version in the **Versions known to be not vulnerable** column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists. \n \n**Important**: F5 has created an engineering hotfix to address this issue for FirePass 7.0. You can obtain the engineering hotfix by contacting [F5 Technical Support](<http://www.f5.com/training-support/customer-support/contact/>) and referencing this article number. For more information, refer to SOL8986: F5 software life cycle policy. \n \nF5 is responding to this vulnerability as determined by the parameters defined in SOL4602: Overview of the F5 security vulnerability response policy.\n\n**Mitigating this vulnerability**\n\nTo mitigate this vulnerability, you should consider the following recommendations:\n\n * Consider denying access to the Configuration utility and using only the command line and** **Traffic Management Shell (**tmsh**) until the BIG-IP system is updated. If that is not possible, F5 recommends that you access the Configuration utility over only a secure network.\n * If SSL profiles are configured to use COMPAT ciphers, consider reconfiguring the profiles to use ciphers from the NATIVE SSL stack. For information about the NATIVE and COMPAT ciphers, refer to the following articles: \n \n\n * SOL13163: SSL ciphers supported on BIG-IP platforms (11.x - 12.x)\n * SOL13171: Configuring the cipher strength for SSL profiles (11.x)\n * SOL13187: COMPAT SSL ciphers are no longer included in standard cipher strings\n * Limit traffic between the BIG-IP system and pool members to trusted traffic.\n * Verify that servers with which the F5 device communicates (such as pool members) are not using vulnerable OpenSSL versions.\n\nSupplemental Information\n\n * For more information about SSL profiles, refer to the following articles: \n \n\n * SOL14783: Overview of the Client SSL profile (11.x - 12.x)\n * SOL14806: Overview of the Server SSL profile (11.x - 12.x)\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated document\n * SOL4918: Overview of the F5 critical issue hotfix policy\n * SOL167: Downloading software and firmware from F5\n * SOL17329: BIG-IP GTM name has changed to BIG-IP DNS\n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 7.4, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.2}, "published": "2014-06-05T00:00:00", "type": "f5", "title": "SOL15325 - OpenSSL vulnerability CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2016-07-25T00:00:00", "id": "SOL15325", "href": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2020-04-06T22:39:45", "description": "\nF5 Product Development has assigned IDs 465799 and 466486 (BIG-IP), ID 466469 (FirePass), ID 466956 (Enterprise Manager), ID 466954 (BIG-IQ), and ID 466317 (BIG-IP Edge Client) to this vulnerability. Additionally, BIG-IP [iHealth](<http://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H465802 on the** Diagnostics** > **Identified** > **Medium | High** screen.\n\nTo determine if your release contains vulnerable server-side components, vulnerable client-side components, or both, and to obtain information about releases or hotfixes that resolve the vulnerability, refer to the following tables:\n\n**Server-side components**\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Vulnerable component or feature \n---|---|---|--- \nBIG-IP LTM| 11.5.0, 11.5.1| 12.0.0 \n11.6.0 \n11.5.3 \n11.5.2 \n11.5.1 HF3 \n11.5.0 HF4 \n11.0.0 - 11.4.1 \n10.0.0 - 10.2.4| Configuration utility \nbig3d \nCOMPAT SSL ciphers \nBIG-IP AAM| 11.5.0, 11.5.1| 12.0.0 \n11.6.0 \n11.5.3 \n11.5.2 \n11.5.1 HF3 \n11.5.0 HF4 \n11.4.0 - 11.4.1| Configuration utility \nbig3d \nCOMPAT SSL ciphers \nBIG-IP AFM| 11.5.0, 11.5.1| 12.0.0 \n11.6.0 \n11.5.3 \n11.5.2 \n11.5.1 HF3 \n11.5.0 HF4 \n11.3.0 - 11.4.1| Configuration utility \nbig3d \nCOMPAT SSL ciphers \nBIG-IP Analytics| 11.5.0, 11.5.1| 12.0.0 \n11.6.0 \n11.5.3 \n11.5.2 \n11.5.1 HF3 \n11.5.0 HF4 \n11.0.0 - 11.4.1| Configuration utility \nbig3d \nCOMPAT SSL ciphers \nBIG-IP APM| 11.5.0, 11.5.1| 12.0.0 \n11.6.0 \n11.5.3 \n11.5.2 \n11.5.1 HF3 \n11.5.0 HF4 \n11.0.0 - 11.4.1 \n10.1.0 - 10.2.4| Configuration utility \nbig3d \nCOMPAT SSL ciphers \nBIG-IP ASM| 11.5.0, 11.5.1| 12.0.0 \n11.6.0 \n11.5.3 \n11.5.2 \n11.5.1 HF3 \n11.5.0 HF4 \n11.0.0 - 11.4.1 \n10.0.0 - 10.2.4| Configuration utility \nbig3d \nCOMPAT SSL ciphers \nBIG-IP DNS| None| 12.0.0| None \nBIG-IP Edge Gateway| None| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None \nBIG-IP GTM| 11.5.0, 11.5.1| 11.6.0 \n11.5.3 \n11.5.2 \n11.5.1 HF3 \n11.5.0 HF4 \n11.0.0 - 11.4.1 \n10.0.0 - 10.2.4| Configuration utility \nbig3d \nCOMPAT SSL ciphers \nBIG-IP Link Controller| 11.5.0, 11.5.1| 12.0.0 \n11.6.0 \n11.5.3 \n11.5.2 \n11.5.1 HF3 \n11.5.0 HF4 \n11.0.0 - 11.4.1 \n10.0.0 - 10.2.4| Configuration utility \nbig3d \nCOMPAT SSL ciphers \nBIG-IP PEM| 11.5.0, 11.5.1| 12.0.0 \n11.6.0 \n11.5.3 \n11.5.2 \n11.5.1 HF3 \n11.5.0 HF4 \n11.3.0 - 11.4.1| Configuration utility \nbig3d \nCOMPAT SSL ciphers \nBIG-IP PSM| None| 11.0.0 - 11.4.1 \n10.0.0 - 10.2.4| None \nBIG-IP WebAccelerator| None| 11.0.0 - 11.3.0 \n10.0.0 - 10.2.4| None \nBIG-IP WOM| None| 11.0.0 - 11.3.0 \n10.0.0 - 10.2.4| None \nARX| None| 6.0.0 - 6.4.0| None \nEnterprise Manager| None| 3.0.0 - 3.1.1 \n2.1.0 - 2.3.0| None \nFirePass| None| 7.0.0 \n6.0.0 - 6.1.0| None \nBIG-IQ Cloud| None| 4.0.0 - 4.5.0| None \nBIG-IQ Device| None| 4.2.0 - 4.5.0| None \nBIG-IQ Security| None| 4.0.0 - 4.5.0| None \nLineRate| 2.3.0 - 2.3.1 \n2.2.0 - 2.2.4 \n1.6.0 - 1.6.3| None| OpenSSL \n \n**Client-side components**\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Vulnerable component or feature \n---|---|---|--- \nBIG-IP LTM| 11.0.0 - 11.5.1 \n10.0.0 - 10.2.4| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4 \n11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP AAM| 11.4.0 - 11.5.1| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP AFM| 11.3.0 - 11.5.1| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP Analytics| 11.0.0 - 11.5.1| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4 \n11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP APM| 11.0.0 - 11.5.1 \n10.1.0 - 10.2.4| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4 \n11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP ASM| 11.0.0 - 11.5.1 \n10.0.0 - 10.2.4| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4 \n11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP DNS| None| 12.0.0| None \nBIG-IP Edge Gateway| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| 11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP GTM| 11.0.0 - 11.5.1 \n10.0.0 - 10.2.4| 11.6.0 \n11.5.1 HF3 \n11.5.0 HF4 \n11.2.1 HF15| Host-initiated SSL connections \nBIG-IP Link Controller| 11.0.0 - 11.5.1 \n10.0.0 - 10.2.4| 12.0.0 \n11.6.0 \n11.5.1 HF3 \n11.5.0 HF4 \n11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP PEM| 11.3.0 - 11.5.1| 11.5.1 HF3 \n11.5.0 HF4| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP PSM| 11.0.0 - 11.4.1 \n10.0.0 - 10.2.4| 11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP WebAccelerator| 11.0.0 - 11.3.0 \n10.0.0 - 10.2.4| 11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nBIG-IP WOM| 11.0.0 - 11.3.0 \n10.0.0 - 10.2.4| 11.2.1 HF15| Host-initiated SSL connections \nCOMPAT SSL ciphers \nARX| None| 6.0.0 - 6.4.0| None \nEnterprise Manager| 2.0.0 - 2.3.0| None| Host-initiated SSL connections \nFirePass| 7.0.0 \n6.0.0 - 6.1.0| None| Host-initiated SSL connections \nBIG-IQ Cloud| 4.0.0 - 4.3.0| None| Host-initiated SSL connections \nBIG-IQ Device| 4.2.0 - 4.3.0| None| Host-initiated SSL connections \nBIG-IQ Security| 4.0.0 - 4.3.0| None| Host-initiated SSL connections \nLineRate| 2.3.0 - 2.3.1 \n2.2.0 - 2.2.4 \n1.6.0 - 1.6.3| None| Host-initiated SSL connections \nBIG-IP Edge Clients for Linux| 6035 - 7071| 7101.2014.0612.* \n7100.2014.0612.* \n7091.2014.0612.* \n7090.2014.0612.* \n7080.2014.0624.*| VPN \nBIG-IP Edge Client for MAC OS X| 6035 - 7071| 7101.2014.0612.* \n7100.2014.0612.* \n7091.2014.0612.* \n7090.2014.0612.* \n7080.2014.0624.*| VPN \nBIG-IP Edge Client for Windows| 7101.* - 7101.2014.0611.* \n7100.* - 7100.2014.0611.* \n7091.* - 7091.2014.0611.* \n7090.* - 7090.2014.0611.* \n7080.* - 7080.2014.0623.* \n6035 - 7071| 7101.2014.0612.1847 \n7100.2014.0612.1847 \n7091.2014.0612.1950 \n7090.2014.0612.1853 \n7080.2014.0624.2054| VPN (DTLS Only) \nBIG-IP Edge Client for iOS| 2.0.0 - 2.0.2 \n1.0.5 - 1.0.6| 2.0.3| VPN \nBIG-IP Edge Client for Android| 2.0.1 - 2.0.4| 2.0.5| VPN\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable column**. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\n**Mitigating this vulnerability**\n\nTo mitigate this vulnerability, you should consider the following recommendations:\n\n * Consider denying access to the Configuration utility and using only the command line and** **Traffic Management Shell (**tmsh**) until the BIG-IP system is updated. If that is not possible, F5 recommends that you access the Configuration utility over only a secure network.\n * If SSL profiles are configured to use COMPAT ciphers, consider reconfiguring the profiles to use ciphers from the NATIVE SSL stack. For information about the NATIVE and COMPAT ciphers, refer to the following articles: \n\n * [K13163: SSL ciphers supported on BIG-IP platforms (11.x - 12.x)](<https://support.f5.com/csp/article/K13163>)\n * [K13171: Configuring the cipher strength for SSL profiles (11.x)](<https://support.f5.com/csp/article/K13171>)\n * [K13187: COMPAT SSL ciphers are no longer included in standard cipher strings](<https://support.f5.com/csp/article/K13187>)\n * Limit traffic between the BIG-IP system and pool members to trusted traffic.\n * Verify that servers with which the F5 device communicates (such as pool members) are not using vulnerable OpenSSL versions.\n\n * For more information about SSL profiles, refer to the following articles: \n * [K14783: Overview of the Client SSL profile (11.x - 12.x)](<https://support.f5.com/csp/article/K14783>)\n * [K14806: Overview of the Server SSL profile (11.x - 12.x)](<https://support.f5.com/csp/article/K14806>)\n * The [Nmap ssl-ccs-injection](<https://nmap.org/nsedoc/scripts/ssl-ccs-injection.html>) page \n**Note:** This link takes you to a resource outside of AskF5. The third party could remove the document without our knowledge.\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated document](<https://support.f5.com/csp/article/K9957>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n * [K17329: BIG-IP GTM name has changed to BIG-IP DNS](<https://support.f5.com/csp/article/K17329>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 7.4, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.2}, "published": "2015-10-15T21:04:00", "type": "f5", "title": "OpenSSL vulnerability CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2019-11-12T22:53:00", "id": "F5:K15325", "href": "https://support.f5.com/csp/article/K15325", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "cve": [{"lastseen": "2023-05-26T14:10:19", "description": "crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.", "cvss3": {}, "published": "2012-01-27T00:55:00", "type": "cve", "title": "CVE-2011-4354", "cwe": ["CWE-310"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-4354"], "modified": "2012-11-06T05:03:00", "cpe": ["cpe:/a:openssl:openssl:0.9.8g", "cpe:/a:openssl:openssl:0.9.6c", "cpe:/a:openssl:openssl:0.9.6j", "cpe:/a:openssl:openssl:0.9.7k", "cpe:/a:openssl:openssl:0.9.1c", "cpe:/a:openssl:openssl:0.9.4", "cpe:/a:openssl:openssl:0.9.6b", "cpe:/a:openssl:openssl:0.9.7", "cpe:/a:openssl:openssl:0.9.8", "cpe:/a:openssl:openssl:0.9.3", "cpe:/a:openssl:openssl:0.9.6m", "cpe:/a:openssl:openssl:0.9.3a", "cpe:/a:openssl:openssl:0.9.6a", "cpe:/a:openssl:openssl:0.9.2b", "cpe:/a:openssl:openssl:0.9.7e", "cpe:/a:openssl:openssl:0.9.7i", "cpe:/a:openssl:openssl:0.9.7b", "cpe:/a:openssl:openssl:0.9.7c", "cpe:/a:openssl:openssl:0.9.8d", "cpe:/a:openssl:openssl:0.9.8e", "cpe:/a:openssl:openssl:0.9.6g", "cpe:/a:openssl:openssl:0.9.7g", "cpe:/a:openssl:openssl:0.9.7h", "cpe:/a:openssl:openssl:0.9.7f", "cpe:/a:openssl:openssl:0.9.6i", "cpe:/a:openssl:openssl:0.9.6", "cpe:/a:openssl:openssl:0.9.6f", "cpe:/a:openssl:openssl:0.9.8b", "cpe:/a:openssl:openssl:0.9.7a", "cpe:/a:openssl:openssl:0.9.6h", "cpe:/a:openssl:openssl:0.9.6e", "cpe:/a:openssl:openssl:0.9.5", "cpe:/a:openssl:openssl:0.9.7j", "cpe:/a:openssl:openssl:0.9.7m", "cpe:/a:openssl:openssl:0.9.8f", "cpe:/a:openssl:openssl:0.9.6l", "cpe:/a:openssl:openssl:0.9.6d", "cpe:/a:openssl:openssl:0.9.6k", "cpe:/a:openssl:openssl:0.9.8a", "cpe:/a:openssl:openssl:0.9.7l", "cpe:/a:openssl:openssl:0.9.5a", "cpe:/a:openssl:openssl:0.9.7d", "cpe:/a:openssl:openssl:0.9.8c"], "id": "CVE-2011-4354", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4354", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}, "cpe23": ["cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:x86:*", "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-05-27T10:03:57", "description": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2014-06-05T21:55:00", "type": "cve", "title": "CVE-2014-0224", "cwe": ["CWE-326"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2022-08-16T13:30:00", "cpe": ["cpe:/o:opensuse:opensuse:13.2", "cpe:/o:opensuse:opensuse:13.1", "cpe:/o:fedoraproject:fedora:19", "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0", "cpe:/a:redhat:jboss_enterprise_web_server:2.0.1", "cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0", "cpe:/a:redhat:storage:2.1", "cpe:/o:fedoraproject:fedora:20", "cpe:/o:redhat:enterprise_linux:4", "cpe:/o:redhat:enterprise_linux:6.0", "cpe:/o:redhat:enterprise_linux:5", "cpe:/a:redhat:jboss_enterprise_application_platform:6.2.3"], "id": "CVE-2014-0224", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0224", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"]}], "debiancve": [{"lastseen": "2023-05-26T14:33:14", "description": "crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.", "cvss3": {}, "published": "2012-01-27T00:55:00", "type": "debiancve", "title": "CVE-2011-4354", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-4354"], "modified": "2012-01-27T00:55:00", "id": "DEBIANCVE:CVE-2011-4354", "href": "https://security-tracker.debian.org/tracker/CVE-2011-4354", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-05-27T10:11:29", "description": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2014-06-05T21:55:00", "type": "debiancve", "title": "CVE-2014-0224", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2014-06-05T21:55:00", "id": "DEBIANCVE:CVE-2014-0224", "href": "https://security-tracker.debian.org/tracker/CVE-2014-0224", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "ubuntucve": [{"lastseen": "2023-05-26T14:45:36", "description": "crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used\nin stunnel and other products, in certain circumstances involving ECDH or\nECDHE cipher suites, uses an incorrect modular reduction algorithm in its\nimplementation of the P-256 and P-384 NIST elliptic curves, which allows\nremote attackers to obtain the private key of a TLS server via multiple\nhandshake attempts.", "cvss3": {}, "published": "2012-01-26T00:00:00", "type": "ubuntucve", "title": "CVE-2011-4354", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-4354"], "modified": "2012-01-26T00:00:00", "id": "UB:CVE-2011-4354", "href": "https://ubuntu.com/security/CVE-2011-4354", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-05-27T14:15:48", "description": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does\nnot properly restrict processing of ChangeCipherSpec messages, which allows\nman-in-the-middle attackers to trigger use of a zero-length master key in\ncertain OpenSSL-to-OpenSSL communications, and consequently hijack sessions\nor obtain sensitive information, via a crafted TLS handshake, aka the \"CCS\nInjection\" vulnerability.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2014-06-05T00:00:00", "type": "ubuntucve", "title": "CVE-2014-0224", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2014-06-05T00:00:00", "id": "UB:CVE-2014-0224", "href": "https://ubuntu.com/security/CVE-2014-0224", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "metasploit": [{"lastseen": "2022-11-01T09:00:06", "description": "This module checks for the OpenSSL ChangeCipherSpec (CCS) Injection vulnerability. The problem exists in the handling of early CCS messages during session negotiation. Vulnerable installations of OpenSSL accepts them, while later implementations do not. If successful, an attacker can leverage this vulnerability to perform a man-in-the-middle (MITM) attack by downgrading the cipher spec between a client and server. This issue was first reported in early June, 2014.\n", "cvss3": {}, "published": "2014-06-09T22:38:11", "type": "metasploit", "title": "OpenSSL Server-Side ChangeCipherSpec Injection Scanner", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2017-07-24T13:26:21", "id": "MSF:AUXILIARY-SCANNER-SSL-OPENSSL_CCS-", "href": "https://www.rapid7.com/db/modules/auxiliary/scanner/ssl/openssl_ccs/", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::Tcp\n include Msf::Auxiliary::Scanner\n include Msf::Auxiliary::Report\n\n CIPHER_SUITES = [\n 0xc014, # TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA\n 0xc00a, # TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA\n 0xc022, # TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA\n 0xc021, # TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA\n 0x0039, # TLS_DHE_RSA_WITH_AES_256_CBC_SHA\n 0x0038, # TLS_DHE_DSS_WITH_AES_256_CBC_SHA\n 0x0088, # TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA\n 0x0087, # TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA\n 0x0087, # TLS_ECDH_RSA_WITH_AES_256_CBC_SHA\n 0xc00f, # TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA\n 0x0035, # TLS_RSA_WITH_AES_256_CBC_SHA\n 0x0084, # TLS_RSA_WITH_CAMELLIA_256_CBC_SHA\n 0xc012, # TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA\n 0xc008, # TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA\n 0xc01c, # TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA\n 0xc01b, # TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA\n 0x0016, # TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA\n 0x0013, # TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA\n 0xc00d, # TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA\n 0xc003, # TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA\n 0x000a, # TLS_RSA_WITH_3DES_EDE_CBC_SHA\n 0xc013, # TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA\n 0xc009, # TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA\n 0xc01f, # TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA\n 0xc01e, # TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA\n 0x0033, # TLS_DHE_RSA_WITH_AES_128_CBC_SHA\n 0x0032, # TLS_DHE_DSS_WITH_AES_128_CBC_SHA\n 0x009a, # TLS_DHE_RSA_WITH_SEED_CBC_SHA\n 0x0099, # TLS_DHE_DSS_WITH_SEED_CBC_SHA\n 0x0045, # TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA\n 0x0044, # TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA\n 0xc00e, # TLS_ECDH_RSA_WITH_AES_128_CBC_SHA\n 0xc004, # TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA\n 0x002f, # TLS_RSA_WITH_AES_128_CBC_SHA\n 0x0096, # TLS_RSA_WITH_SEED_CBC_SHA\n 0x0041, # TLS_RSA_WITH_CAMELLIA_128_CBC_SHA\n 0xc011, # TLS_ECDHE_RSA_WITH_RC4_128_SHA\n 0xc007, # TLS_ECDHE_ECDSA_WITH_RC4_128_SHA\n 0xc00c, # TLS_ECDH_RSA_WITH_RC4_128_SHA\n 0xc002, # TLS_ECDH_ECDSA_WITH_RC4_128_SHA\n 0x0005, # TLS_RSA_WITH_RC4_128_SHA\n 0x0004, # TLS_RSA_WITH_RC4_128_MD5\n 0x0015, # TLS_DHE_RSA_WITH_DES_CBC_SHA\n 0x0012, # TLS_DHE_DSS_WITH_DES_CBC_SHA\n 0x0009, # TLS_RSA_WITH_DES_CBC_SHA\n 0x0014, # TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA\n 0x0011, # TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA\n 0x0008, # TLS_RSA_EXPORT_WITH_DES40_CBC_SHA\n 0x0006, # TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5\n 0x0003, # TLS_RSA_EXPORT_WITH_RC4_40_MD5\n 0x00ff # Unknown\n ]\n\n HANDSHAKE_RECORD_TYPE = 0x16\n CCS_RECORD_TYPE = 0x14\n ALERT_RECORD_TYPE = 0x15\n TLS_VERSION = {\n 'SSLv3' => 0x0300,\n '1.0' => 0x0301,\n '1.1' => 0x0302,\n '1.2' => 0x0303\n }\n\n def initialize\n super(\n 'Name' => 'OpenSSL Server-Side ChangeCipherSpec Injection Scanner',\n 'Description' => %q{\n This module checks for the OpenSSL ChangeCipherSpec (CCS)\n Injection vulnerability. The problem exists in the handling of early\n CCS messages during session negotiation. Vulnerable installations of OpenSSL accepts\n them, while later implementations do not. If successful, an attacker can leverage this\n vulnerability to perform a man-in-the-middle (MITM) attack by downgrading the cipher spec\n between a client and server. This issue was first reported in early June, 2014.\n },\n 'Author' => [\n 'Masashi Kikuchi', # Vulnerability discovery\n 'Craig Young <CYoung[at]tripwire.com>', # Original Scanner. This module is based on it.\n 'juan vazquez' # Metasploit module\n ],\n 'References' =>\n [\n ['CVE', '2014-0224'],\n ['URL', 'http://ccsinjection.lepidum.co.jp/'],\n ['URL', 'http://ccsinjection.lepidum.co.jp/blog/2014-06-05/CCS-Injection-en/index.html'],\n ['URL', 'http://www.tripwire.com/state-of-security/incident-detection/detection-script-for-cve-2014-0224-openssl-cipher-change-spec-injection/'],\n ['URL', 'https://www.imperialviolet.org/2014/06/05/earlyccs.html']\n ],\n 'DisclosureDate' => 'Jun 5 2014',\n 'License' => MSF_LICENSE\n )\n\n register_options(\n [\n Opt::RPORT(443),\n OptEnum.new('TLS_VERSION', [true, 'TLS/SSL version to use', '1.0', ['SSLv3','1.0', '1.1', '1.2']]),\n OptInt.new('RESPONSE_TIMEOUT', [true, 'Number of seconds to wait for a server response', 10])\n ])\n end\n\n def response_timeout\n datastore['RESPONSE_TIMEOUT']\n end\n\n def run_host(ip)\n ccs_injection\n end\n\n def ccs_injection\n connect_result = establish_connect\n return if connect_result.nil?\n\n vprint_status(\"Sending CCS...\")\n sock.put(ccs)\n alert = sock.get_once(-1, response_timeout)\n if alert.blank?\n print_good(\"No alert after invalid CCS message, probably vulnerable\")\n report\n elsif alert.unpack(\"C\").first == ALERT_RECORD_TYPE\n vprint_error(\"Alert record as response to the invalid CCS Message, probably not vulnerable\")\n elsif alert\n vprint_warning(\"Unexpected response.\")\n end\n end\n\n def report\n report_vuln({\n :host => rhost,\n :port => rport,\n :name => self.name,\n :refs => self.references,\n :info => \"Module #{self.fullname} successfully detected CCS injection\"\n })\n end\n\n def ccs\n payload = \"\\x01\" # Change Cipher Spec Message\n\n ssl_record(CCS_RECORD_TYPE, payload)\n end\n\n def client_hello\n # Use current day for TLS time\n time_temp = Time.now\n time_epoch = Time.mktime(time_temp.year, time_temp.month, time_temp.day, 0, 0).to_i\n\n hello_data = [TLS_VERSION[datastore['TLS_VERSION']]].pack(\"n\") # Version TLS\n hello_data << [time_epoch].pack(\"N\") # Time in epoch format\n hello_data << Rex::Text.rand_text(28) # Random\n hello_data << \"\\x00\" # Session ID length\n hello_data << [CIPHER_SUITES.length * 2].pack(\"n\") # Cipher Suites length (102)\n hello_data << CIPHER_SUITES.pack(\"n*\") # Cipher Suites\n hello_data << \"\\x01\" # Compression methods length (1)\n hello_data << \"\\x00\" # Compression methods: null\n\n data = \"\\x01\\x00\" # Handshake Type: Client Hello (1)\n data << [hello_data.length].pack(\"n\") # Length\n data << hello_data\n\n ssl_record(HANDSHAKE_RECORD_TYPE, data)\n end\n\n def ssl_record(type, data)\n record = [type, TLS_VERSION[datastore['TLS_VERSION']], data.length].pack('Cnn')\n record << data\n end\n\n def establish_connect\n connect\n\n vprint_status(\"Sending Client Hello...\")\n sock.put(client_hello)\n server_hello = sock.get_once(-1, response_timeout)\n\n unless server_hello\n vprint_error(\"No Server Hello after #{response_timeout} seconds...\")\n disconnect\n return nil\n end\n\n unless server_hello.unpack(\"C\").first == HANDSHAKE_RECORD_TYPE\n vprint_error(\"Server Hello Not Found\")\n return nil\n end\n\n true\n end\nend\n\n", "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/ssl/openssl_ccs.rb", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-04-09T15:05:00", "description": "This module is a simple client for the SSL Labs APIs, designed for SSL/TLS assessment during a penetration test.\n", "cvss3": {}, "published": "2015-03-27T11:34:11", "type": "metasploit", "title": "SSL Labs API Client", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2018-01-22T22:32:16", "id": "MSF:AUXILIARY-GATHER-SSLLABS_SCAN-", "href": "https://www.rapid7.com/db/modules/auxiliary/gather/ssllabs_scan/", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nrequire 'active_support/inflector'\nrequire 'json'\nrequire 'active_support/core_ext/hash'\n\nclass MetasploitModule < Msf::Auxiliary\n class InvocationError < StandardError; end\n class RequestRateTooHigh < StandardError; end\n class InternalError < StandardError; end\n class ServiceNotAvailable < StandardError; end\n class ServiceOverloaded < StandardError; end\n\n class Api\n attr_reader :max_assessments, :current_assessments\n\n def initialize\n @max_assessments = 0\n @current_assessments = 0\n end\n\n def request(name, params = {})\n api_host = \"api.ssllabs.com\"\n api_port = \"443\"\n api_path = \"/api/v2/\"\n user_agent = \"Msf_ssllabs_scan\"\n\n name = name.to_s.camelize(:lower)\n uri = api_path + name\n cli = Rex::Proto::Http::Client.new(api_host, api_port, {}, true, 'TLS')\n cli.connect\n req = cli.request_cgi({\n 'uri' => uri,\n 'agent' => user_agent,\n 'method' => 'GET',\n 'vars_get' => params\n })\n res = cli.send_recv(req)\n cli.close\n\n if res && res.code.to_i == 200\n @max_assessments = res.headers['X-Max-Assessments']\n @current_assessments = res.headers['X-Current-Assessments']\n r = JSON.load(res.body)\n fail InvocationError, \"API returned: #{r['errors']}\" if r.key?('errors')\n return r\n end\n\n case res.code.to_i\n when 400\n fail InvocationError\n when 429\n fail RequestRateTooHigh\n when 500\n fail InternalError\n when 503\n fail ServiceNotAvailable\n when 529\n fail ServiceOverloaded\n else\n fail StandardError, \"HTTP error code #{r.code}\", caller\n end\n end\n\n def report_unused_attrs(type, unused_attrs)\n unused_attrs.each do | attr |\n # $stderr.puts \"#{type} request returned unknown parameter #{attr}\"\n end\n end\n\n def info\n obj, unused_attrs = Info.load request(:info)\n report_unused_attrs('info', unused_attrs)\n obj\n end\n\n def analyse(params = {})\n obj, unused_attrs = Host.load request(:analyze, params)\n report_unused_attrs('analyze', unused_attrs)\n obj\n end\n\n def get_endpoint_data(params = {})\n obj, unused_attrs = Endpoint.load request(:get_endpoint_data, params)\n report_unused_attrs('get_endpoint_data', unused_attrs)\n obj\n end\n\n def get_status_codes\n obj, unused_attrs = StatusCodes.load request(:get_status_codes)\n report_unused_attrs('get_status_codes', unused_attrs)\n obj\n end\n end\n\n class ApiObject\n\n class << self;\n attr_accessor :all_attributes\n attr_accessor :fields\n attr_accessor :lists\n attr_accessor :refs\n end\n\n def self.inherited(base)\n base.all_attributes = []\n base.fields = []\n base.lists = {}\n base.refs = {}\n end\n\n def self.to_api_name(name)\n name.to_s.gsub(/\\?$/, '').camelize(:lower)\n end\n\n def self.to_attr_name(name)\n name.to_s.gsub(/\\?$/, '').underscore\n end\n\n def self.field_methods(name)\n is_bool = name.to_s.end_with?('?')\n attr_name = to_attr_name(name)\n api_name = to_api_name(name)\n class_eval <<-EOF, __FILE__, __LINE__\n def #{attr_name}#{'?' if is_bool}\n @#{api_name}\n end\n def #{attr_name}=(value)\n @#{api_name} = value\n end\n EOF\n end\n\n def self.has_fields(*names)\n names.each do |name|\n @all_attributes << to_api_name(name)\n @fields << to_api_name(name)\n field_methods(name)\n end\n end\n\n def self.has_objects_list(name, klass)\n @all_attributes << to_api_name(name)\n @lists[to_api_name(name)] = klass\n field_methods(name)\n end\n\n def self.has_object_ref(name, klass)\n @all_attributes << to_api_name(name)\n @refs[to_api_name(name)] = klass\n field_methods(name)\n end\n\n def self.load(attributes = {})\n obj = self.new\n unused_attrs = []\n attributes.each do |name, value|\n if @fields.include?(name)\n obj.instance_variable_set(\"@#{name}\", value)\n elsif @lists.key?(name)\n unless value.nil?\n var = value.map do |v|\n val, ua = @lists[name].load(v)\n unused_attrs.concat ua\n val\n end\n obj.instance_variable_set(\"@#{name}\", var)\n end\n elsif @refs.key?(name)\n unless value.nil?\n val, ua = @refs[name].load(value)\n unused_attrs.concat ua\n obj.instance_variable_set(\"@#{name}\", val)\n end\n else\n unused_attrs << name\n end\n end\n return obj, unused_attrs\n end\n\n def to_json(opts = {})\n obj = {}\n self.class.all_attributes.each do |api_name|\n v = instance_variable_get(\"@#{api_name}\")\n obj[api_name] = v\n end\n obj.to_json\n end\n end\n\n class Cert < ApiObject\n has_fields :subject,\n :commonNames,\n :altNames,\n :notBefore,\n :notAfter,\n :issuerSubject,\n :sigAlg,\n :issuerLabel,\n :revocationInfo,\n :crlURIs,\n :ocspURIs,\n :revocationStatus,\n :crlRevocationStatus,\n :ocspRevocationStatus,\n :sgc?,\n :validationType,\n :issues,\n :sct?,\n :mustStaple,\n :sha1Hash,\n :pinSha256\n\n def valid?\n issues == 0\n end\n\n def invalid?\n !valid?\n end\n end\n\n class ChainCert < ApiObject\n has_fields :subject,\n :label,\n :notBefore,\n :notAfter,\n :issuerSubject,\n :issuerLabel,\n :sigAlg,\n :issues,\n :keyAlg,\n :keySize,\n :keyStrength,\n :revocationStatus,\n :crlRevocationStatus,\n :ocspRevocationStatus,\n :raw,\n :sha1Hash,\n :pinSha256\n\n def valid?\n issues == 0\n end\n\n def invalid?\n !valid?\n end\n end\n\n class Chain < ApiObject\n has_objects_list :certs, ChainCert\n has_fields :issues\n\n def valid?\n issues == 0\n end\n\n def invalid?\n !valid?\n end\n end\n\n class Key < ApiObject\n has_fields :size,\n :strength,\n :alg,\n :debianFlaw?,\n :q\n\n def insecure?\n debian_flaw? || q == 0\n end\n\n def secure?\n !insecure?\n end\n end\n\n class Protocol < ApiObject\n has_fields :id,\n :name,\n :version,\n :v2SuitesDisabled?,\n :q\n\n def insecure?\n q == 0\n end\n\n def secure?\n !insecure?\n end\n\n end\n\n class Info < ApiObject\n has_fields :engineVersion,\n :criteriaVersion,\n :clientMaxAssessments,\n :maxAssessments,\n :currentAssessments,\n :messages,\n :newAssessmentCoolOff\n end\n\n class SimClient < ApiObject\n has_fields :id,\n :name,\n :platform,\n :version,\n :isReference?\n end\n\n class Simulation < ApiObject\n has_object_ref :client, SimClient\n has_fields :errorCode,\n :attempts,\n :protocolId,\n :suiteId,\n :kxInfo\n\n def success?\n error_code == 0\n end\n\n def error?\n !success?\n end\n end\n\n class SimDetails < ApiObject\n has_objects_list :results, Simulation\n end\n\n class StatusCodes < ApiObject\n has_fields :statusDetails\n\n def [](name)\n status_details[name]\n end\n end\n\n class Suite < ApiObject\n has_fields :id,\n :name,\n :cipherStrength,\n :dhStrength,\n :dhP,\n :dhG,\n :dhYs,\n :ecdhBits,\n :ecdhStrength,\n :q\n\n def insecure?\n q == 0\n end\n\n def secure?\n !insecure?\n end\n end\n\n class Suites < ApiObject\n has_objects_list :list, Suite\n has_fields :preference?\n end\n\n class EndpointDetails < ApiObject\n has_fields :hostStartTime\n has_object_ref :key, Key\n has_object_ref :cert, Cert\n has_object_ref :chain, Chain\n has_objects_list :protocols, Protocol\n has_object_ref :suites, Suites\n has_fields :serverSignature,\n :prefixDelegation?,\n :nonPrefixDelegation?,\n :vulnBeast?,\n :renegSupport,\n :stsResponseHeader,\n :stsMaxAge,\n :stsSubdomains?,\n :pkpResponseHeader,\n :sessionResumption,\n :compressionMethods,\n :supportsNpn?,\n :npnProtocols,\n :sessionTickets,\n :ocspStapling?,\n :staplingRevocationStatus,\n :staplingRevocationErrorMessage,\n :sniRequired?,\n :httpStatusCode,\n :httpForwarding,\n :supportsRc4?,\n :forwardSecrecy,\n :rc4WithModern?\n has_object_ref :sims, SimDetails\n has_fields :heartbleed?,\n :heartbeat?,\n :openSslCcs,\n :poodle?,\n :poodleTls,\n :fallbackScsv?,\n :freak?,\n :hasSct,\n :stsStatus,\n :stsPreload,\n :supportsAlpn,\n :rc4Only,\n :protocolIntolerance,\n :miscIntolerance,\n :openSSLLuckyMinus20,\n :logjam,\n :chaCha20Preference,\n :hstsPolicy,\n :hstsPreloads,\n :hpkpPolicy,\n :hpkpRoPolicy,\n :drownHosts,\n :drownErrors,\n :drownVulnerable\n end\n\n class Endpoint < ApiObject\n has_fields :ipAddress,\n :serverName,\n :statusMessage,\n :statusDetails,\n :statusDetailsMessage,\n :grade,\n :gradeTrustIgnored,\n :hasWarnings?,\n :isExceptional?,\n :progress,\n :duration,\n :eta,\n :delegation\n has_object_ref :details, EndpointDetails\n end\n\n class Host < ApiObject\n has_fields :host,\n :port,\n :protocol,\n :isPublic?,\n :status,\n :statusMessage,\n :startTime,\n :testTime,\n :engineVersion,\n :criteriaVersion,\n :cacheExpiryTime\n has_objects_list :endpoints, Endpoint\n has_fields :certHostnames\n end\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'SSL Labs API Client',\n 'Description' => %q{\n This module is a simple client for the SSL Labs APIs, designed for\n SSL/TLS assessment during a penetration test.\n },\n 'License' => MSF_LICENSE,\n 'Author' =>\n [\n 'Denis Kolegov <dnkolegov[at]gmail.com>',\n 'Francois Chagnon' # ssllab.rb author (https://github.com/Shopify/ssllabs.rb)\n ],\n 'DefaultOptions' =>\n {\n 'RPORT' => 443,\n 'SSL' => true,\n }\n ))\n register_options(\n [\n OptString.new('HOSTNAME', [true, 'The target hostname']),\n OptInt.new('DELAY', [true, 'The delay in seconds between API requests', 5]),\n OptBool.new('USECACHE', [true, 'Use cached results (if available), else force live scan', true]),\n OptBool.new('GRADE', [true, 'Output only the hostname: grade', false]),\n OptBool.new('IGNOREMISMATCH', [true, 'Proceed with assessments even when the server certificate doesn\\'t match the assessment hostname', true])\n ])\n end\n\n def report_good(line)\n print_good line\n end\n\n def report_warning(line)\n print_warning line\n end\n\n def report_bad(line)\n print_warning line\n end\n\n def report_status(line)\n print_status line\n end\n\n def output_endpoint_data(r)\n ssl_protocols = [\n { id: 771, name: \"TLS\", version: \"1.2\", secure: true, active: false },\n { id: 770, name: \"TLS\", version: \"1.1\", secure: true, active: false },\n { id: 769, name: \"TLS\", version: \"1.0\", secure: true, active: false },\n { id: 768, name: \"SSL\", version: \"3.0\", secure: false, active: false },\n { id: 2, name: \"SSL\", version: \"2.0\", secure: false, active: false }\n ]\n\n report_status \"-----------------------------------------------------------------\"\n report_status \"Report for #{r.server_name} (#{r.ip_address})\"\n report_status \"-----------------------------------------------------------------\"\n\n case r.grade.to_s\n when \"A+\", \"A\", \"A-\"\n report_good \"Overall rating: #{r.grade}\"\n when \"B\"\n report_warning \"Overall rating: #{r.grade}\"\n when \"C\", \"D\", \"E\", \"F\"\n report_bad \"Overall rating: #{r.grade}\"\n when \"M\"\n report_bad \"Overall rating: #{r.grade} - Certificate name mismatch\"\n when \"T\"\n report_bad \"Overall rating: #{r.grade} - Server's certificate is not trusted\"\n end\n\n report_warning \"Grade is #{r.grade_trust_ignored}, if trust issues are ignored)\" if r.grade.to_s != r.grade_trust_ignored.to_s\n\n # Supported protocols\n r.details.protocols.each do |i|\n p = ssl_protocols.detect { |x| x[:id] == i.id }\n p.store(:active, true) if p\n end\n\n ssl_protocols.each do |proto|\n if proto[:active]\n if proto[:secure]\n report_good \"#{proto[:name]} #{proto[:version]} - Yes\"\n else\n report_bad \"#{proto[:name]} #{proto[:version]} - Yes\"\n end\n else\n report_good \"#{proto[:name]} #{proto[:version]} - No\"\n end\n end\n\n # Renegotioation\n case\n when r.details.reneg_support == 0\n report_warning \"Secure renegotiation is not supported\"\n when r.details.reneg_support[0] == 1\n report_bad \"Insecure client-initiated renegotiation is supported\"\n when r.details.reneg_support[1] == 1\n report_good \"Secure renegotiation is supported\"\n when r.details.reneg_support[2] == 1\n report_warning \"Secure client-initiated renegotiation is supported\"\n when r.details.reneg_support[3] == 1\n report_warning \"Server requires secure renegotiation support\"\n end\n\n # BEAST\n if r.details.vuln_beast?\n report_bad \"BEAST attack - Yes\"\n else\n report_good \"BEAST attack - No\"\n end\n\n # POODLE (SSLv3)\n if r.details.poodle?\n report_bad \"POODLE SSLv3 - Vulnerable\"\n else\n report_good \"POODLE SSLv3 - Not vulnerable\"\n end\n\n # POODLE TLS\n case r.details.poodle_tls\n when -1\n report_warning \"POODLE TLS - Test failed\"\n when 0\n report_warning \"POODLE TLS - Unknown\"\n when 1\n report_good \"POODLE TLS - Not vulnerable\"\n when 2\n report_bad \"POODLE TLS - Vulnerable\"\n end\n\n # Downgrade attack prevention\n if r.details.fallback_scsv?\n report_good \"Downgrade attack prevention - Yes, TLS_FALLBACK_SCSV supported\"\n else\n report_bad \"Downgrade attack prevention - No, TLS_FALLBACK_SCSV not supported\"\n end\n\n # Freak\n if r.details.freak?\n report_bad \"Freak - Vulnerable\"\n else\n report_good \"Freak - Not vulnerable\"\n end\n\n # RC4\n if r.details.supports_rc4?\n report_warning \"RC4 - Server supports at least one RC4 suite\"\n else\n report_good \"RC4 - No\"\n end\n\n # RC4 with modern browsers\n report_warning \"RC4 is used with modern clients\" if r.details.rc4_with_modern?\n\n # Heartbeat\n if r.details.heartbeat?\n report_status \"Heartbeat (extension) - Yes\"\n else\n report_status \"Heartbeat (extension) - No\"\n end\n\n # Heartbleed\n if r.details.heartbleed?\n report_bad \"Heartbleed (vulnerability) - Yes\"\n else\n report_good \"Heartbleed (vulnerability) - No\"\n end\n\n # OpenSSL CCS\n case r.details.open_ssl_ccs\n when -1\n report_warning \"OpenSSL CCS vulnerability (CVE-2014-0224) - Test failed\"\n when 0\n report_warning \"OpenSSL CCS vulnerability (CVE-2014-0224) - Unknown\"\n when 1\n report_good \"OpenSSL CCS vulnerability (CVE-2014-0224) - No\"\n when 2\n report_bad \"OpenSSL CCS vulnerability (CVE-2014-0224) - Possibly vulnerable, but not exploitable\"\n when 3\n report_bad \"OpenSSL CCS vulnerability (CVE-2014-0224) - Vulnerable and exploitable\"\n end\n\n # Forward Secrecy\n case\n when r.details.forward_secrecy == 0\n report_bad \"Forward Secrecy - No\"\n when r.details.forward_secrecy[0] == 1\n report_bad \"Forward Secrecy - With some browsers\"\n when r.details.forward_secrecy[1] == 1\n report_good \"Forward Secrecy - With modern browsers\"\n when r.details.forward_secrecy[2] == 1\n report_good \"Forward Secrecy - Yes (with most browsers)\"\n end\n\n # HSTS\n if r.details.sts_response_header\n str = \"Strict Transport Security (HSTS) - Yes\"\n if r.details.sts_max_age && r.details.sts_max_age != -1\n str += \":max-age=#{r.details.sts_max_age}\"\n end\n str += \":includeSubdomains\" if r.details.sts_subdomains?\n report_good str\n else\n report_bad \"Strict Transport Security (HSTS) - No\"\n end\n\n # HPKP\n if r.details.pkp_response_header\n report_good \"Public Key Pinning (HPKP) - Yes\"\n else\n report_warning \"Public Key Pinning (HPKP) - No\"\n end\n\n # Compression\n if r.details.compression_methods == 0\n report_good \"Compression - No\"\n elsif (r.details.session_tickets & 1) != 0\n report_warning \"Compression - Yes (Deflate)\"\n end\n\n # Session Resumption\n case r.details.session_resumption\n when 0\n print_status \"Session resumption - No\"\n when 1\n report_warning \"Session resumption - No (IDs assigned but not accepted)\"\n when 2\n print_status \"Session resumption - Yes\"\n end\n\n # Session Tickets\n case\n when r.details.session_tickets == 0\n print_status \"Session tickets - No\"\n when r.details.session_tickets[0] == 1\n print_status \"Session tickets - Yes\"\n when r.details.session_tickets[1] == 1\n report_good \"Session tickets - Implementation is faulty\"\n when r.details.session_tickets[2] == 1\n report_warning \"Session tickets - Server is intolerant to the extension\"\n end\n\n # OCSP stapling\n if r.details.ocsp_stapling?\n print_status \"OCSP Stapling - Yes\"\n else\n print_status \"OCSP Stapling - No\"\n end\n\n # NPN\n if r.details.supports_npn?\n print_status \"Next Protocol Negotiation (NPN) - Yes (#{r.details.npn_protocols})\"\n else\n print_status \"Next Protocol Negotiation (NPN) - No\"\n end\n\n # SNI\n print_status \"SNI Required - Yes\" if r.details.sni_required?\n end\n\n def output_grades_only(r)\n r.endpoints.each do |e|\n if e.status_message == \"Ready\"\n print_status \"Server: #{e.server_name} (#{e.ip_address}) - Grade:#{e.grade}\"\n else\n print_status \"Server: #{e.server_name} (#{e.ip_address} - Status:#{e.status_message}\"\n end\n end\n end\n\n def output_common_info(r)\n return unless r\n print_status \"Host: #{r.host}\"\n\n r.endpoints.each do |e|\n print_status \"\\t #{e.ip_address}\"\n end\n end\n\n def output_result(r, grade)\n return unless r\n output_common_info(r)\n if grade\n output_grades_only(r)\n else\n r.endpoints.each do |e|\n if e.status_message == \"Ready\"\n output_endpoint_data(e)\n else\n print_status \"#{e.status_message}\"\n end\n end\n end\n end\n\n def output_testing_details(r)\n return unless r.status == \"IN_PROGRESS\"\n\n if r.endpoints.length == 1\n print_status \"#{r.host} (#{r.endpoints[0].ip_address}) - Progress #{[r.endpoints[0].progress, 0].max}% (#{r.endpoints[0].status_details_message})\"\n elsif r.endpoints.length > 1\n in_progress_srv_num = 0\n ready_srv_num = 0\n pending_srv_num = 0\n r.endpoints.each do |e|\n case e.status_message.to_s\n when \"In progress\"\n in_progress_srv_num += 1\n print_status \"Scanned host: #{e.ip_address} (#{e.server_name})- #{[e.progress, 0].max}% complete (#{e.status_details_message})\"\n when \"Pending\"\n pending_srv_num += 1\n when \"Ready\"\n ready_srv_num += 1\n end\n end\n progress = ((ready_srv_num.to_f / (pending_srv_num + in_progress_srv_num + ready_srv_num)) * 100.0).round(0)\n print_status \"Ready: #{ready_srv_num}, In progress: #{in_progress_srv_num}, Pending: #{pending_srv_num}\"\n print_status \"#{r.host} - Progress #{progress}%\"\n end\n end\n\n def valid_hostname?(hostname)\n hostname =~ /^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$/\n end\n\n def run\n delay = datastore['DELAY']\n hostname = datastore['HOSTNAME']\n unless valid_hostname?(hostname)\n print_status \"Invalid hostname\"\n return\n end\n\n usecache = datastore['USECACHE']\n grade = datastore['GRADE']\n\n # Use cached results\n if usecache\n from_cache = 'on'\n start_new = 'off'\n else\n from_cache = 'off'\n start_new = 'on'\n end\n\n # Ignore mismatch\n ignore_mismatch = datastore['IGNOREMISMATCH'] ? 'on' : 'off'\n\n api = Api.new\n info = api.info\n print_status \"SSL Labs API info\"\n print_status \"API version: #{info.engine_version}\"\n print_status \"Evaluation criteria: #{info.criteria_version}\"\n print_status \"Running assessments: #{info.current_assessments} (max #{info.max_assessments})\"\n\n if api.current_assessments >= api.max_assessments\n print_status \"Too many active assessments\"\n return\n end\n\n if usecache\n r = api.analyse(host: hostname, fromCache: from_cache, ignoreMismatch: ignore_mismatch, all: 'done')\n else\n r = api.analyse(host: hostname, startNew: start_new, ignoreMismatch: ignore_mismatch, all: 'done')\n end\n\n loop do\n case r.status\n when \"DNS\"\n print_status \"Server: #{r.host} - #{r.status_message}\"\n when \"IN_PROGRESS\"\n output_testing_details(r)\n when \"READY\"\n output_result(r, grade)\n return\n when \"ERROR\"\n print_error \"#{r.status_message}\"\n return\n else\n print_error \"Unknown assessment status\"\n return\n end\n sleep delay\n r = api.analyse(host: hostname, all: 'done')\n end\n\n rescue RequestRateTooHigh\n print_error \"Request rate is too high, please slow down\"\n rescue InternalError\n print_error \"Service encountered an error, sleep 5 minutes\"\n rescue ServiceNotAvailable\n print_error \"Service is not available, sleep 15 minutes\"\n rescue ServiceOverloaded\n print_error \"Service is overloaded, sleep 30 minutes\"\n rescue\n print_error \"Invalid parameters\"\n end\nend\n", "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/gather/ssllabs_scan.rb", "cvss": {"score": 0.0, "vector": "NONE"}}], "ibm": [{"lastseen": "2023-02-13T01:35:22", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_http://xforce.iss.net/xforce/xfdb/93586_](<http://xforce.iss.net/xforce/xfdb/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nAll TS3400 tape libraries with firmware version lower than 0042.\n\n## Remediation/Fixes\n\nApply firmware version 0042 or later, available from IBM Fix Central \n<http://www-933.ibm.com/support/fixcentral/>\n\n## Workarounds and Mitigations\n\nNone known.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-18T00:08:04", "type": "ibm", "title": "Security Bulletin: TS3400 is affected by the following OpenSSL vulnerabilities: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-18T00:08:04", "id": "2244436F502BD4ED1C081FDC68E7A71143D7F9B0E35067F1C1C77FB61470EC9B", "href": "https://www.ibm.com/support/pages/node/689639", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-12T17:35:18", "description": "## Summary\n\nA fix is available for IBM SONAS, for the OpenSSL security vulnerability\n\n## Vulnerability Details\n\n**CVEID: ** \nCVE-2014-0224 \n \n**DESCRIPTION:** \nSSL/TLS MITM vulnerability \n \nAn attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. \n \nThe attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. IBM SONAS systems use OpenSSL server functionality and some versions are vulnerable (see below). \n \n[_CVE-2014-0224_](<http://xforce.iss.net/xforce/xfdb/93586>) \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_http://xforce.iss.net/xforce/xfdb/93586_](<http://xforce.iss.net/xforce/xfdb/93586>) for the current score\n\n## Affected Products and Versions\n\nIBM SONAS \nThe product is affected when running a code releases 1.3.0.0 to 1.4.3.2\n\n## Remediation/Fixes\n\nA fix for these issues is in version 1.4.3.3 of IBM SONAS. Customers running an affected version of IBM SONAS should upgrade to 1.4.3.3 or a later version, so that the fix gets applied. \n \n**_Workaround(s) & Mitigation(s):_** \n \nEnsure that all users who have access to the system are authenticated by another security system such as a firewall.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-18T00:08:27", "type": "ibm", "title": "Security Bulletin: OpenSSL security vulnerability on IBM SONAS (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-18T00:08:27", "id": "8600D4FE1C84EFD70C8C1A94E48F4DDFC42B18B82D5F8C7EE6D12E22048B63B3", "href": "https://www.ibm.com/support/pages/node/689895", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:49:29", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n| **Subscribe to My Notifications to be notified of important product support alerts like this.**\n\n * Follow [this link](<https://www.ibm.com/systems/support/myview/subscription/css.wss/subscriptions?methodName=startSearchToSubscribe&uctug_rational_dcfsbblurb_2013-11-05_myn_adoption_promo>) for more information (requires login with your IBM ID) \n---|--- \n \n**CVE-ID:** [_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**Description:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \n**CVSS Base Score:** 5.8 \n**CVSS Temporal Score:** See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \n**CVSS Environmental Score*:** Undefined \n**CVSS Vector:** (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n\n## Affected Products and Versions\n\n4.3, 4.3.0.1, 4.3.0.2, 4.3.0.3, 4.3.0.4, 4.3.0.5, 4.3.0.6\n\n## Remediation/Fixes\n\nUpgrade to [Rational Tau Interim Fix 1 for 4.3.0.6](<http://www.ibm.com/support/docview.wss?uid=swg24037888>)\n\n## Workarounds and Mitigations\n\nNone\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-17T04:55:15", "type": "ibm", "title": "Security Bulletin: Rational Tau is affected by OpenSSL vulnerabilities (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-17T04:55:15", "id": "3FECBC639ADFEB79371F9900171834D9C0E821EFFB9AE772387931314E921F6F", "href": "https://www.ibm.com/support/pages/node/514339", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-23T21:53:09", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project\n\n## Vulnerability Details\n\nThis document contains multiple Security Bulletins use the links below to view the bulletin you want:\n\n * IBM Flex System Fabric EN4093/EN4093R 10Gb Scalable Switch, Flex System Fabric CN4093 10Gb Converged Scalable Switch, Flex System Fabric SI4093 System Interconnect Module, Flex System EN2092 1Gb Ethernet Scalable Switch affected by the following OpenSSL vulnerability: CVE-2014-0224 \n \n\n * Security Bulletin: IBM System Networking RackSwitch G8264CS and IBM Flex System Interconnect Fabric are affected by the following OpenSSL vulnerability: CVE-2014-0224 \n \n\n * Security Bulletin: IBM Rackswitch G8052, IBM Rackswitch G8124, IBM Rackswitch G8124-E, IBM Rackswitch G8124-ER, IBM RackSwitch G8264, IBM RackSwitch G8264-T, IBM RackSwitch G8316, IBM RackSwitch G8332 are impacted by the OpenSSL vulnerability: CVE-2014-0224 \n \n\n * Security Bulletin: IBM BladeCenter Virtual Fabric 10 Gb Ethernet Switch Module and IBM BladeCenter 1/10Gb Uplink Ethernet Switch Module are impacted by the OpenSSL vulnerability: CVE-2014-0224\n\n## IBM Flex System Fabric EN4093/EN4093R 10Gb Scalable Switch, Flex System Fabric CN4093 10Gb Converged Scalable Switch, Flex System Fabric SI4093 System Interconnect Module, Flex System EN2092 1Gb Ethernet Scalable Switch affected by the following OpenSSL vulnerability: CVE-2014-0224\n\n## Abstract\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Content\n\n**Vulnerability Details:**\n\n**CVE-ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n\n**Description:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic.\n\nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n \n\n\n## Affected products and versions\n\nProduct | FW Version \n---|--- \nIBM Flex System Fabric EN4093/EN4093R 10Gb Scalable Switch | 7.8.4.0 and earlier \nIBM Flex System Fabric CN4093 10Gb Converged Scalable Switch | \n\n7.8.4.0 and earlier \n \nIBM Flex System Fabric SI4093 System Interconnect Module | \n\n7.8.4.0 and earlier \n \nIBM Flex System EN2092 1Gb Ethernet Scalable Switch | 7.8.4.0 and earlier \n \n## Remediation:\n\nIBM recommends updating the Flex System Networking Switch Module to firmware version 7.8.5.0 available on Fix Central \n\n\n## Workaround(s) & Mitigation(s):\n\nNone known \n\n\n## References:\n\n * [Complete CVSS Guide](<http://www.first.org/cvss/cvss-guide.html>)\n * [On-line Calculator V2](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n * [OpenSSL Project vulnerability website](<http://www.openssl.org/news/vulnerabilities.html>)\n\n**Related Information:** \n[IBM Secure Engineering Web Portal](<http://www-01.ibm.com/software/test/wenses/security/>) \n[IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/PSIRT>) \n\n\n**Acknowledgement** \nNone\n\n**Change History** \n19 June 2014: Original Version Published\n\n* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.\n\nNote: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n* * *\n\n## Security Bulletin: IBM System Networking RackSwitch G8264CS and IBM Flex System Interconnect Fabric are affected by the following OpenSSL vulnerability: CVE-2014-0224\n\n \n\n\n## Abstract\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Content\n\n**Vulnerability Details:**\n\n**CVE-ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n\n**Decrsiption:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic.\n\nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected products and versions\n\nProduct | FW Version \n---|--- \nIBM System Networking RackSwitch G8264CS | 7.8.4.0 and earlier \nIBM Flex System Interconnect Fabric | 7.8.4.0 \n \n## Remediation:\n\nIBM recommends updating the firmware version for each of the above products to 7.8.5.0, available on Fix Central. \n \n\n\n## Workaround(s) & Mitigation(s):\n\nNone known\n\n## References:\n\n * [Complete CVSS Guide](<http://www.first.org/cvss/cvss-guide.html>)\n * [On-line Calculator V2](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n * [OpenSSL Project vulnerability website](<http://www.openssl.org/news/vulnerabilities.html>)\n\n**Related Information:** \n[IBM Secure Engineering Web Portal](<http://www-01.ibm.com/software/test/wenses/security/>) \n[IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/PSIRT>) \n\n\n**Acknowledgement** \nNone\n\n**Change History** \n12 June, 2014: Original Version Published\n\n* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.\n\nNote: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n* * *\n\n## Security Bulletin: IBM BladeCenter Virtual Fabric 10 Gb Ethernet Switch Module and IBM BladeCenter 1/10Gb Uplink Ethernet Switch Module are impacted by the OpenSSL vulnerability: CVE-2014-0224\n\n## Abstract\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Content\n\n**Vulnerability Details:**\n\n**CVE-ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n\n**Descriptoin:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic.\n\nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected products and versions\n\nProduct | FW Version \n---|--- \nIBM BladeCenter Virtual Fabric 10 Gb Ethernet Switch Module | All FW versions prior to 7.7.4.0 \nIBM BladeCenter 1/10Gb Uplink Ethernet Switch Module | All FW Versions prior to 7.4.7.0 \n \n## Remediation:\n\nIBM BladeCenter Virtual Fabric 10 Gb Ethernet Switch ModuleIBM BladeCenter 1/10Gb Uplink Ethernet Switch Module, 7.4.7.0. \n\n\n## Workaround(s) & Mitigation(s):\n\nNone known\n\n## References:\n\n * [Complete CVSS Guide](<http://www.first.org/cvss/cvss-guide.html>)\n * [On-line Calculator V2](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n * [OpenSSL Project vulnerability website](<http://www.openssl.org/news/vulnerabilities.html>)\n\n**Related Information:** \n[IBM Secure Engineering Web Portal](<http://www-01.ibm.com/software/test/wenses/security/>) \n[IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/PSIRT>) \n\n\n**Acknowledgement** \nNone\n\n**Change History** \n25 June, 2014: Original Version Published\n\n* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.\n\nNote: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n* * *\n\n## Security Bulletin: IBM Rackswitch G8052, IBM Rackswitch G8124, IBM Rackswitch G8124-E, IBM Rackswitch G8124-ER, IBM RackSwitch G8264, IBM RackSwitch G8264-T, IBM RackSwitch G8316, IBM RackSwitch G8332 are impacted by the OpenSSL vulnerability: CVE-2014-0224\n\n## Abstract\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Content\n\n**Vulnerability Details:**\n\n**CVE-ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n\n**Descriptoin:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic.\n\nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected products and versions\n\nProduct | FW Version \n---|--- \nIBM Rackswitch G8052 | All FW versions prior to 7.8.10.0 \nIBM RackSwitch G8264 | All FW versions prior to 7.8.10.0 \nIBM RackSwitch G8264-T | All FW versions prior to 7.8.10.0 \nIBM RackSwitch G8316 | All FW versions prior to 7.8.10.0 \nIBM Rackswitch G8124 | All FW versions prior to 7.7.10.0 \nIBM Rackswitch G8124-E | All FW versions prior to 7.7.10.0 \nIBM Rackswitch G8124-ER | All FW versions prior to 7.7.10.0 \nIBM RackSwitch G8332 | All FW versions prior to 7.7.16.0 \n \n## Remediation:\n\nIBM Rackswitch G8052, IBM RackSwitch G8264, IBM RackSwitch G8264-TIBM RackSwitch G8316, IBM Rackswitch G8124, IBM Rackswitch G8124-E and IBM Rackswitch G8124-ER, 7.7.10.0. For IBM RackSwitch G8332, 7.7.16.0. \n\n\n## Workaround(s) & Mitigation(s):\n\nNone known\n\n## References:\n\n * [Complete CVSS Guide](<http://www.first.org/cvss/cvss-guide.html>)\n * [On-line Calculator V2](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n * [OpenSSL Project vulnerability website](<http://www.openssl.org/news/vulnerabilities.html>)\n\n**Related Information:** \n[IBM Secure Engineering Web Portal](<http://www-01.ibm.com/software/test/wenses/security/>) \n[IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/PSIRT>) \n\n\n**Acknowledgement** \nNone\n\n**Change History** \n25 June, 2014: Original Version Published\n\n* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.\n\nNote: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-01-31T01:20:02", "type": "ibm", "title": "Security Bulletin: IBM System Networking switches that are affected by the OpenSSL vulnerability: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2019-01-31T01:20:02", "id": "990206347D3D6727A1A64D57E54B9A6FBB9D5FD607BB515997990C2D2C4A0510", "href": "https://www.ibm.com/support/pages/node/864836", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2022-12-02T21:36:56", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\n * Tivoli Storage Productivity Center 5.2.x\n * Tivoli Storage Productivity Center 5.1.x\n * Tivoli Storage Productivity Center 4.x\n \nThe versions listed above apply to all licensed offerings of Tivoli Storage Productivity Center, including IBM SmartCloud Virtual Storage Center Storage Analytics Engine. \n \nSystem Storage Productivity Center is affected if it has one of the Tivoli Storage Productivity Center versions listed above. \n \nThe following are **not** affected and do not require an update: \n\n * Tivoli Storage Productivity Center for Replication - all versions\n\n## Remediation/Fixes\n\nThe recommended solution is to apply the interim fix, fix pack or refresh pack for each named product as soon as practicable. Links to Fix Central are provided below: \n \n \n**For 5.2.0 through 5.2.2:**\n\n * Apply interim fix [IT02529](<http://www-01.ibm.com/support/docview.wss?uid=swg24037851>)\n\\--OR-- \n * Apply refresh pack 5.2.3 or later (targeted to be available end of August 2014)\n \n**For 5.1.0 through 5.1.1.4:**\n\n * Apply interim fix [IT02529](<http://www-01.ibm.com/support/docview.wss?uid=swg24037851>)\n\\--OR-- \n * Apply fix pack 5.1.1.5 or later (targeted to be available end of July 2014)\n \n**For 4.1.0 through 4.2.2 FP6:**\n\n * Apply interim fix [IT02536](<http://www-01.ibm.com/support/docview.wss?uid=swg24037851>)\n\\--OR-- \n * Apply fix pack 4.2.2 FP7 or later (targeted to be available end July 2014)\n \n[Latest Downloads for Tivoli Storage Productivity Center](<http://www.ibm.com/support/docview.wss?uid=swg21320822>)\n\n## Workarounds and Mitigations\n\nIf you cannot apply the fix provided, you can mitigate exposure in Tivoli Storage Productivity Center by removing all connections to XIV storage subsystems.\n\n## Get Notified about Future Security Bulletins\n\nSubscribe to [My Notifications](< http://www-01.ibm.com/software/support/einfo.html>) to be notified of important product support alerts like this.\n\n## Important Note\n\nIBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the [System z Security web site](<http://www.ibm.com/systems/z/solutions/security_subintegrity.html>). Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.\n\n### References \n\n[Complete CVSS v2 Guide](<http://www.first.org/cvss/v2/guide> \"Link resides outside of ibm.com\" ) \n[On-line Calculator v2](<http://nvd.nist.gov/CVSS-v2-Calculator> \"Link resides outside of ibm.com\" )\n\nOff \n\n[](<https://www-304.ibm.com/support/docview.wss?uid=swg21496117&wv=1>)[__OpenSSL Project vulnerability website__](<http://www.openssl.org/news/vulnerabilities.html>)\n\n## Related Information\n\n[IBM Secure Engineering Web Portal](<http://www.ibm.com/security/secure-engineering/bulletins.html>) \n[IBM Product Security Incident Response Blog](<http://www.ibm.com/blogs/psirt>)\n\n## Acknowledgement\n\nNone\n\n## Change History\n\n23 June 2014: Original Copy Published\n\n*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.\n\n## Disclaimer\n\nReview the [IBM security bulletin disclaimer and definitions](<https://www.ibm.com/support/pages/node/6610583#disclaimer>) regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.\n\n[{\"Product\":{\"code\":\"SS5R93\",\"label\":\"IBM Spectrum Control\"},\"Business Unit\":{\"code\":\"BU058\",\"label\":\"IBM Infrastructure w\\/TPS\"},\"Component\":\"--\",\"Platform\":[{\"code\":\"PF002\",\"label\":\"AIX\"},{\"code\":\"PF010\",\"label\":\"HP-UX\"},{\"code\":\"PF016\",\"label\":\"Linux\"},{\"code\":\"PF027\",\"label\":\"Solaris\"},{\"code\":\"PF033\",\"label\":\"Windows\"}],\"Version\":\"5.1;5.1.1;5.2;5.2.1\",\"Edition\":\"\",\"Line of Business\":{\"code\":\"LOB26\",\"label\":\"Storage\"}},{\"Product\":{\"code\":\"SS5R93\",\"label\":\"IBM Spectrum Control\"},\"Business Unit\":{\"code\":\"BU058\",\"label\":\"IBM Infrastructure w\\/TPS\"},\"Component\":\" \",\"Platform\":[{\"code\":\"PF002\",\"label\":\"AIX\"},{\"code\":\"PF010\",\"label\":\"HP-UX\"},{\"code\":\"PF016\",\"label\":\"Linux\"},{\"code\":\"PF027\",\"label\":\"Solaris\"},{\"code\":\"PF033\",\"label\":\"Windows\"}],\"Version\":\"4.2.2\",\"Edition\":\"\",\"Line of Business\":{\"code\":\"LOB26\",\"label\":\"Storage\"}},{\"Product\":{\"code\":\"SS5R93\",\"label\":\"IBM Spectrum Control\"},\"Business Unit\":{\"code\":\"BU058\",\"label\":\"IBM Infrastructure w\\/TPS\"},\"Component\":null,\"Platform\":[{\"code\":\"PF002\",\"label\":\"AIX\"},{\"code\":\"PF010\",\"label\":\"HP-UX\"},{\"code\":\"PF016\",\"label\":\"Linux\"},{\"code\":\"PF027\",\"label\":\"Solaris\"},{\"code\":\"PF033\",\"label\":\"Windows\"}],\"Version\":\"5.1.1;5.1;5.2;5.2.1\",\"Edition\":\"\",\"Line of Business\":{\"code\":\"LOB26\",\"label\":\"Storage\"}}]", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-08-19T23:26:06", "type": "ibm", "title": "Security Bulletin: Tivoli Storage Productivity Center is affected by the following OpenSSL vulnerabilities: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2022-08-19T23:26:06", "id": "A06D304817DE70B20EBA4D25F86B956B254E5EB0ADC5D6DB9A1B8E8BD263EA8C", "href": "https://www.ibm.com/support/pages/node/514697", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-23T21:53:06", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n## Abstract\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project\n\n## Content\n\n**Vulnerability Details:**\n\n**CVE-ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n\n**Description:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic.\n\nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected products and versions\n\n * System x3630 M4, Type 7158\n * Systemx x3100 M5, Type 5457\n * Systemx x3250 M5, Type 5458\n * System x3750 M4, Type 8722,8733\n * System x3690 X5, Type 7148,7149\n * System x3690 X5, Type 7147,7192\n * System x3750 M4, Type 8752,8718\n * System x3650 M4, Type 7915\n * System x3530 M4, Type 7160\n * System x3500 M4, Type 7383\n * System x3650 M4 BD, Type 5466\n * System x3300 M4, Type 7382\n * System x3550 M4, Type 7914\n * IBM BladeCenter HS23E, Type 8038,8039\n * IBM BladeCenter HX5, Type 7872,1909\n * IBM BladeCenter HX5, Type 1910,7873\n * IBM BladeCenter HS23, Type 7875,1929\n * IBM Flex System x880 X6, Type 4259,7903\n * IBM NeXtScale nx360 M4, Type 5455\n * System x iDataPlex dx360 M4, Type 7912,7913\n * System x3850 X6 / x3950 X6, Type 3837,3839\n * System x3850 X5 / x3950 X5, Type 7145,7146\n * Flex System x240 Compute Node, Type 8737,8738,7863\n * Flex System x222 Compute Node, Type 7916\n * Flex System x440 Compute Node, Type 7917\n * Flex System x220 Compute Node, Type 7906,2585 \n\n\n**Affected Versions**\n\n * IBM Dynamic System Analysis 9.60.DSYTE0R\n * IBM Dynamic System Analysis 9.51.DSYTD4J\n * IBM Dynamic System Analysis 9.54.DSYTD8F\n * IBM Dynamic System Analysis 9.60.DSYTD9S\n * IBM Dynamic System Analysis 9.41.DSYTC2T\n * IBM Dynamic System Analysis 9.41.DSYTC4K\n * IBM Dynamic System Analysis 9.41.DSYTC4J\n * IBM Dynamic System Analysis 9.44.DSYTC4P\n * IBM Dynamic System Analysis 9.35.DSYTAD2\n * IBM Dynamic System Analysis 9.50.DSYTD2Y\n * IBM Dynamic System Analysis 9.60.DSYTE0K\n * IBM Dynamic System Analysis 9.60.DSYTE0M\n * IBM Dynamic System Analysis 9.60.DSYTE0N\n * IBM Dynamic System Analysis 9.28.DSYTAA4\n * IBM Dynamic System Analysis 9.45.DSYTC8F\n\n## Remediation:\n\nIBM recommends updating to IBM Dynamic System Analysis \u2013 Preboot (DSA/pDSA) versions listed in the table below (or newer). Updates are available on the IBM Fix Central page for your hardware platform.\n\n**IBM Dynamic System Analysis 9.60.DSYTE0R**\n\n * System x3850 X6 / x3950 X6 3837,3839\n * Flex System x240 Compute Node 8737,8738,7863\n * Flex System x222 Compute Node 7916\n * Flex System x440 Compute Node 7917\n * Flex System x220 Compute Node 7906,2585\n * IBM Flex System x880 X6 4259,7903\n * System x3100 M5 5457\n * System x3750 M4 8722,8733\n * System x3750 M4 8752,8718 \n \n\n\n**IBM Dynamic System Analysis 9.51.DSYTD4K**\n\n * IBM NeXtScale nx360 M4 5455\n\n**IBM Dynamic System Analysis 9.54.DSYTD8G**\n\n * System x3630 M4 7158\n * BladeCenter HS23E 8038,8039\n * IBM BladeCenter HS23 7875,1929\n * System x3550 M4 7914\n * System x3250 M4 2583\n * System x3100 M4 2582\n * System X iDataPlex dx360 M4 7912,7913\n * IBM System x iDataPlex Direct Water Coo 7918,7919\n * System x3650 M4 7915\n * System x3650 M4 HD 5460\n * System x3530 M4 7160\n * System x3300 M4 7382\n\n**IBM Dynamic System Analysis 9.61.DSYTD9Y**\n\n * System x3630 M4, Type 7158\n * System x3100 M5, Type 5457\n * System x3250 M5, Type 5458\n * System x3750 M4, Type 8722,8733\n * System x3690 X5, Type 7148,7149\n * System x3690 X5, Type 7147,7192\n * System x3750 M4, Type 8752,8718\n * System x3650 M4, Type 7915\n * System x3530 M4, Type 7160\n * System x3500 M4, Type 7383\n * System x3650 M4 BD, Type 5466\n * System x3300 M4, Type 7382\n * System x3550 M4, Type 7914\n * IBM BladeCenter HS23E, Type 8038,8039\n * IBM BladeCenter HX5, Type 7872,1909\n * IBM BladeCenter HX5, Type 1910,7873\n * IBM BladeCenter HS23, Type 7875,1929\n * IBM Flex System x880 X6, Type 4259,7903\n * IBM NeXtScale nx360 M4, Type 5455\n * System x iDataPlex dx360 M4, Type 7912,7913\n * System x3850 X6 / x3950 X6, Type 3837,3839\n * System x3850 X5 / x3950 X5, Type 7145,7146\n * Flex System x240 Compute Node, Type 8737,8738,7863\n * Flex System x222 Compute Node, Type 7916\n * Flex System x440 Compute Node, Type 7917\n * Flex System x220 Compute Node, Type 7906,2585\n\n**IBM Dynamic System Analysis 9.41.DSYTC2U**\n\n * System x3250 M5 5458\n\n## Workaround(s) & Mitigation(s):\n\nNone known \n\n\n## References:\n\n * [Complete CVSS Guide](<http://www.first.org/cvss/cvss-guide.html>)\n * [On-line Calculator V2](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n\n**Related Information:** \n[IBM Secure Engineering Web Portal](<http://www-01.ibm.com/software/test/wenses/security/>) \n[IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/PSIRT>) \n\n\n**Acknowledgement** \nNone\n\n**Change History** \n18 June 2014: Original Version Published\n\n* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.\n\nNote: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-01-31T01:25:01", "type": "ibm", "title": "Security Bulletin: IBM Dynamic System Analysis (DSA) \u0096 Preboot (also known as pDSA) is affected by the following OpenSSL vulnerability: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2019-01-31T01:25:01", "id": "DC50883972FB8044D26EEFD67C684645385A134E796682786975E6EC5D3DDAE4", "href": "https://www.ibm.com/support/pages/node/865012", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-23T21:53:11", "description": "## Summary\n\nAn interface on the IBM BladeCenter Advanced Management Module (AMM) may expose user account names and passwords that have been configured on that AMM.\n\n## Vulnerability Details\n\n## Abstract\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project\n\n## Content\n\n**Vulnerability Details:**\n\nCVE ID: [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n\n**Description:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic.\n\nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n \n\n\n## Affected products and versions\n\nAffected products \n\n * Flex System x220 Compute Node, types 7906, 2585\n * Flex System x222 Compute Node, type 7916 \n * Flex System x240 Compute Node, types 8737, 8738, 7863, 8956 \n * Flex System x440 Compute Node, type 7917 \n\n**Affected Firmware Versions**\n\n1AOO28Q | 1.34 \n---|--- \n1AOO28Q | 1.45 \n1AOO32P | 1.60 \n1AOO40A | 1.88 \n1AOO40E | 2.00 \n1AOO42B | 2.06 \n1AOO41W | 2.60 \n1AOO44Y | 2.61 \n1AOO50B | 3.50 \n1AOO50E | 3.55 \n1AOO50K | 3.56 \n1AOO52Y | 3.78 \n1AOO56Q | 3.79 \n1AOO58R | 4.20 \n \n## Remediation:\n\nIBM recommends updating to Integrated Management Module 2 v4.21 (1AOO58U), available on IBM Fix Central. ****\n\n## Workaround(s) & Mitigation(s):\n\nNone known\n\n \n\n\n## References:\n\n * [Complete CVSS Guide](<http://www.first.org/cvss/cvss-guide.html>)\n * [On-line Calculator V2](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n * [OpenSSL Project vulnerability website](<http://www.openssl.org/news/vulnerabilities.html>)\n\n**Related Information:** \n[IBM Secure Engineering Web Portal](<http://www-01.ibm.com/software/test/wenses/security/>) \n[IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/PSIRT>) \n\n\n**Acknowledgement** \nNone\n\n**Change History** \n18 June 2014: Original Version Published \n\n\n* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.\n\nNote: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-01-31T01:20:02", "type": "ibm", "title": "Security Bulletin: IBM Flex System Integrated Management Module II (IMM2) is affected by the following OpenSSL vulnerability: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2019-01-31T01:20:02", "id": "774110A4E3E369777E935B7A075267987AC640AD2EA965399B4E3C2FF7543E76", "href": "https://www.ibm.com/support/pages/node/864832", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:49:32", "description": "## Summary\n\nA security vulnerability has been discovered in OpenSSL (shipped with IBM Rational Insight) that was reported on June 5, 2014 by the OpenSSL Project. A newer version of this library in made available for resolving this vulnerability.\n\n## Vulnerability Details\n\n| **Subscribe to My Notifications to be notified of important product support alerts like this.**\n\n * Follow [this link](<https://www.ibm.com/systems/support/myview/subscription/css.wss/subscriptions?methodName=startSearchToSubscribe&uctug_rational_dcfsbblurb_2013-11-05_myn_adoption_promo>) for more information (requires login with your IBM ID) \n---|--- \n \n**CVE ID:** [CVE-2014-0224](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0224>) \n \n**Description: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \n**CVSS Base Score:** 5.8 \n**CVSS Temporal Score:** See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \n**CVSS Environmental Score*:** Undefined \n**CVSS Vector:** (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n\n## Affected Products and Versions\n\nRational Insight 1.0.1, 1.0.1 iFix1, 1.0.1.1, 1.1, 1.1.1, 1.1.1.1, 1.1.1.2, 1.1.1.3 and 1.1.1.4\n\n## Remediation/Fixes\n\nThe recommended solution is to apply the recommended fixes to all affected versions of Rational Insight as soon as practical.[](<http://www-01.ibm.com/support/docview.wss?uid=swg24035869>) \n \n**Rational Insight 1.0.1, 1.0.1 iFix1 and 1.0.1.1 ** \n \n\n\n * Download and install the Cognos Business Intelligence 8.4.1 Interim Fix 6. Review document [4037867: Cognos Business Intelligence 8.4.1 interim fixes address a security vulnerability](<http://www.ibm.com/support/docview.wss?uid=swg24037867>) for the detailed instructions.\n \n \n**Rational Insight 1.1, 1.1.1, 1.1.1.1 and 1.1.1.2 ** \n \n\n\n * Download and install the Cognos Business Intelligence 10.1.1 Interim Fix 7. Review document [4037974: Cognos Business Intelligence 10.1.x interim fixes address a security vulnerability](<http://www.ibm.com/support/docview.wss?uid=swg24037974>) for the detailed instructions. \n \n**Note:** The Cognos fix package is installed into the **cognos** subdirectory of the Insight installation.\n \n \n[](<http://www-01.ibm.com/support/docview.wss?uid=swg24035869>)**Rational Insight 1.1.1.3**** ****and 1.1.1.4** \n \n\n\n * Download and install the Cognos Business Intelligence 10.2.1 Interim Fix 6. Review document [4037870: Cognos Business Intelligence 10.2.x interim fixes address a security vulnerability](<http://www.ibm.com/support/docview.wss?uid=swg24037870>) for the detailed instructions. \n \n**Note:** The Cognos fix package is installed into the **cognos** subdirectory of the Insight installation.\n\n## Workarounds and Mitigations\n\nNone\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-17T04:55:09", "type": "ibm", "title": "Security Bulletin: Rational Insight is affected by OpenSSL vulnerability (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-17T04:55:09", "id": "DBE2C597A340BB7900131FBD56B9725ABD555479F4A26F00BC0341CBA4E926B2", "href": "https://www.ibm.com/support/pages/node/514077", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-23T21:53:04", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n## Abstract\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Content\n\n**Vulnerability Details:**\n\n**CVE-ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n\n**Description:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic.\n\nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n \n\n\n## Affected products and versions\n\n * System x3100 M4, type 2582 \n * System x3100 M5, type 5457 \n * System x3250 M4, type 2583 \n * System x3250 M5, type 5458 \n * System x3300 M4, type 7382 \n * System x3500 M4, type 7383 \n * System x3530 M4, type 7160 \n * System x3550 M4, type 7914 \n * System x3570 M4, types 8722, 8733 \n * System x3570 M4, types 8752, 8718 \n * System x3630 M4, type 7158 \n * System x3650 M4 BD, type 5466 \n * System x3650 M4 HD, type 5460 \n * System x3650 M4, type 7915 \n * System x3850 X6, Type 3837\n * System x3950 X6, Type 3837 \n * iDatplex dx360 M4, types 7912, 7913 \n * iDatplex dx360 M4 Water Cooled, types 7918, 7919 \n * NeXtScale nx360 M4, type 5455\nAffected Firmware versions: \n * 1AOO10I 1.00\n * 1AOO10K 1.05\n * 1AOO26K 1.25\n * 1AOO26N 1.26\n * 1AOO28N 1.32\n * 1AOO30D 1.38\n * 1AOO30T 1.40\n * 1AOO30W 1.50\n * 1AOO30Y 1.51\n * 1AOO34A 1.52\n * 1AOO30Z 1.53\n * 1AOO32K 1.59\n * 1AOO32O 1.65\n * 1AOO32S 1.75\n * 1AOO32K 1.77\n * 1AOO36E 1.78\n * 1AOO36F 1.79\n * 1AOO34Z 1.85\n * 1AOO40D 1.86\n * 1AOO36P 1.95\n * 1AOO36R 1.97\n * 1AOO40E 2.00\n * 1AOO40Z 2.50\n * 1AOO42E 2.52\n * 1AOO48H 3.10\n * 1AOO48k 3.20\n * 1AOO36R 3.30\n * 1AOO48N 3.35\n * 1AOO48G 3.36\n * 1AOO48P 3.37\n * 1AOO48M 3.40\n * 1AOO50D 3.65\n * 1AOO50Q 3.67\n * 1AOO52Q 3.70\n * 1AOO52W 3.71\n * 1AOO56D 3.73\n * 1AOO52R 3.74\n * 1AOO56F 3.75\n * 1AOO52S 3.76\n * 1AOO56H 3.77\n * 1AOO52U 3.80\n * 1AOO52Z 3.81\n * 1AOO56E 3.82\n * 1AOO56I 3.83\n * 1AOO56K 3.84\n * 1AOO56L 3.86\n * 1AOO54X 3.90\n * 1AOO58Q 3.91\n * 1AOO58I 4.00\n * 1AOO58F 4.10\n\n## Remediation:\n\nIBM recommends updating these systems to Integrated Management Module 2 v4.31 (1A0058T):\n\n * System x3100 M4, type 2582 \n * System x3250 M4, type 2583 \n * System x3250 M5, type 5458 \n * System x3530 M4, type 7160 \n * System x3550 M4, type 7914 \n * System x3570 M4, types 8722, 8733 \n * System x3570 M4, types 8752, 8718 \n * System x3630 M4, type 7158 \n * System x3650 M4 HD, type 5460 \n * System x3650 M4, type 7915\n * iDatplex dx360 M4, types 7912, 7913 \n * iDatplex dx360 M4 Water Cooled, types 7918, 7919 \n\nIBM recommends updating these systems to Integrated Management Module 2 v4.02 (1A0058S):\n\n * System x3850 X6, Type 3837\n * System x3950 X6, Type 3837 \n\nIBM recommends updating these systems to Integrated Management Module 2 v4.21 (1A0058U):\n\n * System x3100 M5, type 5457 \n\nIBM recommends updating these systems to Integrated Management Module 2 v3.91 (1A0056P):\n\n * NeXtScale nx360 M4, type 5455\n\nIBM recommends updating these systems to Integrated Management Module 2 v3.76 (1A0056Q):\n\n * System x3650 M4 BD, type 5466 \n\nIBM recommends updating these systems to Integrated Management Module 2 v3.86 (1A0056v):\n\n * System x3500 M4, type 7383 \n\n\n## Workaround(s) & Mitigation(s):\n\nNone known\n\n \n\n\n## References:\n\n * [Complete CVSS Guide](<http://www.first.org/cvss/cvss-guide.html>)\n * [On-line Calculator V2](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n * [OpenSSL Project vulnerability website](<http://www.openssl.org/news/vulnerabilities.html>)\n\n**Related Information:** \n[IBM Secure Engineering Web Portal](<http://www-01.ibm.com/software/test/wenses/security/>) \n[IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/PSIRT>) \n\n\n**Acknowledgement** \nNone\n\n**Change History** \n26 June 2014: Original Version Published\n\n* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.\n\nNote: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-01-31T01:25:01", "type": "ibm", "title": "Security Bulletin: Integrated Management Module II (IMM2) is affected by the following OpenSSL vulnerabilities: CVE-2014-0224,", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2019-01-31T01:25:01", "id": "D3D4D30DACE252C88A8FF4DD1D24227CA2454CA9660A72F442E52BC43DBC6C58", "href": "https://www.ibm.com/support/pages/node/865002", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:58:29", "description": "## Summary\n\nA security vulnerability in ChangeCipherSpec processing allows intermediate nodes to intercept encrypted data and decrypt them and can force the use of weak keying material in SSL/TLS clients and servers.\n\n## Vulnerability Details\n\n**CVE ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION:** \nAn attacker using a carefully crafted handshake can force the use of weak keying material in SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. The attack can only be performed between a vulnerable client and a vulnerable server. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nWebSphere DataPower SOA Appliances all versions through 4.0.2.15, 5.0.0.14, 6.0.0.6, and 6.0.1.2. Note that version 7.0.0.0 is not affected.\n\n## Remediation/Fixes\n\nFix is available in versions 5.0.0.15, 6.0.0.7, and 6.0.1.3. Refer to [APAR IT02314](<http://www-01.ibm.com/support/docview.wss?uid=swg1IT02314>) for URLs to download the fix. Customers on DataPower firmware version 4.0.2 and later fix packs, contact customer support.\n\n## Workarounds and Mitigations\n\nNone\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-15T07:00:52", "type": "ibm", "title": "Security Bulletin: Websphere DataPower vulnerability in SSL ChangeCipherSpec processing (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-15T07:00:52", "id": "FE3BD282967A6B7E515961E80162D820AFB7A6484790830E840CF40337EF3235", "href": "https://www.ibm.com/support/pages/node/514271", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T21:40:47", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93586_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nIBM Sterling Connect:Direct for UNIX 4.0.00 \n\u00b7 All versions prior to 4.0.00 iFix 112 \nIBM Sterling Connect:Direct for UNIX 4.1.0 \n\u00b7 All versions prior to 4.1.0.4 iFix 27\n\n## Remediation/Fixes\n\nThe recommended solution is to apply the fix as soon as practical. Please see below for information about the available fixes. \n \n_Fixes for users who are not running Connect:Direct in FIPS mode on HP-UX_ VRMF | APAR | Remediation/First Fix \n---|---|--- \n4.0.00 | IT02558 | Apply 4.0.00 iFix 112, available on IWM \n4.1.0 | IT02558 | Apply 4.1.0.4 iFix 27, available on Fix Central \nAlternatively, upgrade to 4.2.0, which is not affected by the vulnerability. \n \n_Remediation for users who are running Connect:Direct in FIPS mode on HP-UX_ \nApplying the iFixes listed in the table above on HP-UX (PA-RISC and Itanium) invalidates the FIPS mode of operation. Customers who run Connect:Direct on HP-UX in FIPS mode must upgrade to 4.2.0.\n\n## Workarounds and Mitigations\n\nNone\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2020-07-24T22:19:08", "type": "ibm", "title": "Security Bulletin: IBM Sterling Connect:Direct for UNIX is affected by the following OpenSSL vulnerabilities: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2020-07-24T22:19:08", "id": "D05CCE78047F8DFA45B21DFE0E7EB2FF33240CC3C29D657E0AFDDBDB1AD579FB", "href": "https://www.ibm.com/support/pages/node/714141", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-13T05:38:44", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL which impact the management port on DS8870 R7.x\n\n## Vulnerability Details\n\n**CVE-ID:** _CVE-2014-0224_ \n \n**DESCRIPTION: **\n\nAn attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. The attack can only be performed between a vulnerable client *and* server.\n\nCVSS Base Score: 5.8\n\nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score\n\nCVSS Environmental Score*: Undefined\n\nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nDS8870 Release 7.x\n\n## Remediation/Fixes\n\nIBM strongly suggests that you install the vulnerability fix identified immediately below \n\n**Product**| **VRMF**| **APAR**| **Remediation/First Fix** \n---|---|---|--- \nDS8870 R7.2| 87.21.30.0| N/A| 06/30/2014 \nDS8870 R7.3| 87.30.105.0| N/A| 07/27/2014 \n \nPlease contact your IBM representative to order and install the service release \n\n## Workarounds and Mitigations\n\nThe following steps can help mitigate, but not eliminate the risks of this vulnerability: \n\n * Ensure that the DS8000 HMC is installed behind a firewall that limits access to the ports. \n * Ensure that clients used for management are not exposed to this issue since both the server and the client need to have the issue to be exploited.\n * Customers that do not require the CIM interface and do not install the fix, should stop the CIM Agent. \n \n\n\nTo stop the CIM Agent using the Web User Interface on the Hardware Master Console (HMC). \n\n\\- login as \"customer\" \n\n\n\n \n \n\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-18T00:08:25", "type": "ibm", "title": "Security Bulletin: DS8870 Release 7.x affected by a vulnerability in OpenSSL (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-18T00:08:25", "id": "FE7B997F67C37DFC6E3439F0BA52314A66B42B21A8011BE962695F0F97CCBF03", "href": "https://www.ibm.com/support/pages/node/689861", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:52:22", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL. \n\n## Vulnerability Details\n\n**CVE-ID: **[CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n\n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic.\n\n \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n\n## Affected Products and Versions\n\n**Products: **ABYP-0T-0S-4L-P, ABYP-0T-0S-4L-P-M, ABYP-0T-2S-2L-P, ABYP-0T-2S-2L-P-M, ABYP-0T-4S-0L-P, ABYP-0T-4S-0L-P-M, ABYP-10G-2SR-2LR-1-P, ABYP-10G-2SR-2LR-1-P-M, ABYP-10G-4LR-1-P, ABYP-10G-4LR-1-P-M, ABYP-10G-4SR-1-P, ABYP-10G-4SR-1-P-M, ABYP-2T-0S-2L-P, ABYP-2T-0S-2L-P-M, ABYP-2T-1S-1L-P, ABYP-2T-1S-1L-P-M, ABYP-2T-2S-0L-P, ABYP-2T-2S-0L-P-M, ABYP-4T-0S-0L-P, ABYP-4T-0S-0L-P-M, ABYP-4TL-P, ABYP-4TL-P-M, ABYP-4TS-P, ABYP-4TS-P-M \n**Firmware versions**: \n1G NAB \u2013 1.0.849, 1.0.1901, 1.0.2564, 1.0.3097, 2.7-26, 2.10-30, 2.13-33, 2.14-35, 2.15-36, 2.16-37, 2.18-43, 3.4-23, 3.9-34 \n10G NAB - 1.0.1876, 1.0.2919, 0343c3c, 2.11-28, 2.13-34, 2.15-36, 2.18-42, 3.4-23, 3.9-34\n\n## Remediation/Fixes\n\nThe following IBM Threat Updates have the fixes for these vulnerabilities: \n\n_Product_| _Version_| _Remediation/First Fix _ \n---|---|--- \n_IBM Security Proventia Network Active Bypass _| _1G NAB \u2013 1.0.849, 1.0.1901, 1.0.2564, 1.0.3097, 2.7-26, 2.10-30, 2.13-33, 2.14-35, 2.15-36, 2.16-37, 2.18-43, 3.4-23, 3.9-34_| [_Proventia 1G NAB Update 12 (fw3.13-41)_](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=Security%2BSystems&product=ibm/Tivoli/IBM+Security+Network+Active+Bypass&release=All&platform=All&function=all>) \n_IBM Security Proventia Network Active Bypass _| _10G NAB - 1.0.1876, 1.0.2919, 0343c3c, 2.11-28, 2.13-34, 2.15-36, 2.18-42, 3.4-23, 3.9-34_| [_Proventia 10G NAB Update 9 (fw3.13-41)_](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=Security%2BSystems&product=ibm/Tivoli/IBM+Security+Network+Active+Bypass&release=All&platform=All&function=all>) \n \n## Workarounds and Mitigations\n\nNone\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-16T21:18:20", "type": "ibm", "title": "Security Bulletin: IBM Security Proventia Network Active Bypass is affected by vulnerabilities in OpenSSL (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-16T21:18:20", "id": "E7C680A93C62F0B55F2401C00071445427D43012DF7D06E7DC5A5AB3EC669708", "href": "https://www.ibm.com/support/pages/node/515201", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2022-01-01T21:52:43", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n**CVE-ID:** [CVE-2014-0224](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224>)\n\n**DESCRIPTION:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability by using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic.\n\nCVSS Base Score: 5.8\n\n \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93586_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n\n## Affected Products and Versions\n\nz/TPF 1.1.10 and earlier\n\n## Remediation/Fixes\n\n**Product**\n\n| **VRMF**| **APAR**| **Remediation/First Fix** \n---|---|---|--- \nz/TPF| 1.1.10 and earlier| PJ42340| Apply APAR \n \n## Workarounds and Mitigations\n\nNone known\n\n## Get Notified about Future Security Bulletins\n\nSubscribe to [My Notifications](< http://www-01.ibm.com/software/support/einfo.html>) to be notified of important product support alerts like this.\n\n### References \n\n[Complete CVSS v2 Guide](<http://www.first.org/cvss/v2/guide> \"Link resides outside of ibm.com\" ) \n[On-line Calculator v2](<http://nvd.nist.gov/CVSS-v2-Calculator> \"Link resides outside of ibm.com\" )\n\nOff \n\n[OpenSSL Project vulnerability website](<https://www.openssl.org/news/vulnerabilities.html>) \n[TPF product maintenance web page](<http://www.ibm.com/software/htp/tpf/maint/maintztpf.html>)\n\n## Related Information\n\n[IBM Secure Engineering Web Portal](<http://www.ibm.com/security/secure-engineering/bulletins.html>) \n[IBM Product Security Incident Response Blog](<http://www.ibm.com/blogs/psirt>)\n\n## Acknowledgement\n\nNone\n\n## Change History\n\n19 June 2014: Original Version \n\n*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.\n\n## Disclaimer\n\nAccording to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"\"AS IS\"\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n[{\"Product\":{\"code\":\"SSZL53\",\"label\":\"TPF\"},\"Business Unit\":{\"code\":\"BU058\",\"label\":\"IBM Infrastructure w\\/TPS\"},\"Component\":\"z\\/TPF\",\"Platform\":[{\"code\":\"PF036\",\"label\":\"z\\/TPF\"}],\"Version\":\"1.1\",\"Edition\":\"\",\"Line of Business\":{\"code\":\"LOB35\",\"label\":\"Mainframe SW\"}}]", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 7.4, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.2}, "published": "2018-08-03T04:23:43", "type": "ibm", "title": "Security Bulletin: z/TPF is affected by the following OpenSSL vulnerability: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-08-03T04:23:43", "id": "F6AFA8ACEF585CD43E06DE7164EBB8240A1255197762E88CB2BA50823C840FA9", "href": "https://www.ibm.com/support/pages/node/514031", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T01:52:52", "description": "## Summary\n\nIBM Cognos Business Intelligence is shipped as a component of IBM Cognos Controller. Information about a security vulnerability affecting IBM Cognos Business Intelligence has been published in a security bulletin.\n\n## Vulnerability Details\n\nPlease consult the [Security Bulletin: IBM Cognos BI Server is affected by the following OpenSSL vulnerability: CVE-2014-0224](<http://www.ibm.com/support/docview.wss?uid=swg21680511>) for vulnerability details.\n\n## Affected Products and Versions\n\nPrincipal Product and Version(s)\n\n| Affected Supporting Product and Version \n---|--- \nIBM Cognos Controller 10.2.0.x \nIBM Cognos Controller 10.1.1.x \nIBM Cognos Controller 10.1.x \nIBM Cognos Controller 8.5.1.x| IBM Cognos Business Intelligence 10.2.1.2 \nIBM Cognos Business Intelligence 10.1.1 \nIBM Cognos Business Intelligence 10.1 \nIBM Cognos Business Intelligence 8.4.1 \n \n## Remediation/Fixes\n\nDownload the fix for the corresponding version of IBM Cognos Business intelligence and apply the fix on top of your IBM Cognos Controller installation. The fix will update the necessary files without affecting IBM Cognos Controller. \n \n**Note:** The installation of the fix for IBM Cognos Controller 10.2.0.x has a prerequisite. When you apply the fix to IBM Cognos Controller 10.2.0.x you must first download and install the IBM Cognos Business Intelligence 10.2.1.2 Fix Pack.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-15T22:32:20", "type": "ibm", "title": "Security Bulletin: A security vulnerability has been identified in IBM Cognos Business Intelligence shipped with IBM Cognos Controller 8.5.1.x, 10.1.x. 10.1.1.x, and 10.2.0.x (CVE-2014-0224).", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-15T22:32:20", "id": "777F0F4D068445CD2731DBBEDCB91CDA67C414E34826465D084D57BB6B054DF3", "href": "https://www.ibm.com/support/pages/node/245855", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:39:45", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Vulnerability Details\n\n**CVE ID**: [_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: ** \nOpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93586_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nIBM Sterling Connect:Enterprise for UNIX 2.5.00 through 2.5.0.3 iFix03 \nIBM Sterling Connect:Enterprise for UNIX 2.4.0 through 2.4.0.4\n\n## Remediation/Fixes\n\nApply the applicable maintenance packages listed in the table below: \n \n\n\n**_Fix*_**| **_VRMF_**| **_APAR_**| **_How to acquire fix_** \n---|---|---|--- \n_iFix04_| _2.5.0.3_| _N/A_| [_http://www-933.ibm.com/support/fixcentral/swg/identifyFixes?query.parent=ibm~Other%20software&query.product=ibm~Other%20software~Sterling%20Connect:Enterprise%20for%20UNIX&query.release=2.5.0&query.platform=All_](<http://www-933.ibm.com/support/fixcentral/swg/identifyFixes?query.parent=ibm~Other%20software&query.product=ibm~Other%20software~Sterling%20Connect:Enterprise%20for%20UNIX&query.release=2.5.0&query.platform=All>) \n_iFix 1_| _2.4.0.4_| _N/A_| [_https://www14.software.ibm.com/webapp/iwm/web/reg/signup.do?source=swg-SterlngLegacyreq&lang=en_US_](<https://www14.software.ibm.com/webapp/iwm/web/reg/signup.do?source=swg-SterlngLegacyreq&lang=en_US>) \n \n## Workarounds and Mitigations\n\nNone\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-12-18T01:14:08", "type": "ibm", "title": "Security Bulletin: IBM Sterling Connect:Enterprise for UNIX affected by the following OpenSSL vulnerability (CVE-2014-0224).", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2019-12-18T01:14:08", "id": "065C6267E33F60E263D9B7F689F432B3413883F6EF7A0BE4EDF4BB598847FCFA", "href": "https://www.ibm.com/support/pages/node/514427", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2022-06-28T22:16:16", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_http://xforce.iss.net/xforce/xfdb/93586_](<http://xforce.iss.net/xforce/xfdb/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\n**Versions (350)** \n350.00: 01Ex350_039_038 \n350.10: 01Ex350_049_038, 01Ex350_053_038, 01Ex350_054_038 \n350.20: 01Ex350_063_038 \n350.30: 01EA350_071_071, 01Ex350_071_038 \n350.40: 01EA350_074_074 \n350.50: 01EA350_085_074, 01Ex350_085_038 \n350.60: 01EA350_103_074, 01Ex350_103_038 \n350.70: 01EA350_107_074, 01Ex350_107_038 \n350.80: 01EA350_108_074, 01Ex350_108_038 \n350.90: 01EA350_118_074, 01Ex350_118_038, 01Ex350_120_038 \n350.A0: 01EA350_126_074, 01Ex350_126_038 \n350.B0: 01EA350_132_074, 01Ex350_132_038 \n350.B1: 01EA350_136_074 \n350.C0: 01Ex350_143_038, \n350.D0: 01EA350_149_074, 01Ex350_149_038 \n \n**350 Platforms Impacted:** \nIBM BladeCenter JS12 Express (7998-60X) \nIBM BladeCenter JS22 (7998-61X) \nIBM BladeCenter JS23 (7778-23X) \nIBM BladeCenter JS43 (7778-23X with feature code 8446) \nIBM Power 520 Express (9407-M15) \nIBM Power 520 Express (9408-M25) \nIBM Power 520 Express (8203-E4A) F/C 5633 \nIBM Power 520 Express (8203-E4A) F/C 5634 \nIBM Power 520 Express (8203-E4A) F/C 5635 \nIBM Power 520 Express (8203-E4A) F/C 5577 \nIBM Power 520 Express (8203-E4A) F/C 5587 \nIBM Power 550 Express (9409-M50) \nIBM Power 550 Express (8204-E8A) F/C 4965 \nIBM Power 550 Express (8204-E8A) F/C 4667 \nIBM Power 560 Express (8234-EMA) \nIBM Power 570 (9406-MMA) \nIBM Power 570 (9117-MMA) \nIBM Power 575 (9125-F2A) \nIBM Power 595 (9119-FHA) \n \n**Versions (730)** \n730.00: 01Ax730_031_031, 01Ax730_039_035, 01AA730_039_035 \n730.20: 01Ax730_045_035 \n730.30: 01Ax730_049_035, 01Ax730_051_035, 01Ax730_052_035 \n730.40: 01Ax730_058_035, 01AA730_059_035, 01AL730_060_035 \n730.45: 01Ax730_065_035 \n730.46: 01Ax730_066_035 \n730.50: 01Ax730_078_035 \n730.51: 01Ax730_087_035 \n730.60: 01AA730_094_035, 01Ax730_095_035 \n730.61: 01Ax730_099_035 \n730.70: 01Ax730_114_035, \n730.71: 01Ax730_115_035 \n730.72: 01Ax730_116_035 \n730.80: 01Ax730_122_035 \n730.90: 01Ax730_127_035 \n \n**730 Platforms Impacted:** \nIBM Power PS700 (8406-70Y) \nIBM Power PS701 (8406-71Y) \nIBM Power PS702 (8406-71Y) \nIBM Power PS703 (7891-73X) \nIBM Power PS704 (7891-74X) \nIBM Power 750 (8233-E8B) \nIBM Power 755(8236-E8C) \nIBM Power 710 Express (8231-E2B) \nIBM Power 730 Express (8231-E2B) \nIBM Power 720 Express (8202-E4B) \nIBM Power 740 Express (8205-E6B) \nIBM Power 770 (9117-MMB) \nIBM Power 780 (9179-MHB) \n \n**Versions (740)** \n740.00: 01Ax740_042_042 \n740.10: 01Ax740_043_042 \n740.15: 01Ax740_045_042 \n740.16: 01Ax740_046_042 \n740.20: 01Ax740_075_042 \n740.21: 01Ax740_077_042 \n740.40: 01Ax740_088_042 \n740.50: 01Ax740_095_042 \n740.51: 01Ax740_098_042 \n740.52: 01Ax740_100_042 \n740.60: 01Ax740_110_042 \n740.61: 01Ax740_112_042 \n740.70: 01Ax740_121_042 \n740.80: 01Ax740_126_042 \n \n**740 Platforms Impacted:** \nIBM Power 710 (8231-E1C) \nIBM Power 720 (8202-E4C) \nIBM Power 730 (8231-E2C) \nIBM Power 740 (8205-E6C) \nIBM Power 770 (9117-MMC) \nIBM Power 780 (9179-MHC) \n \n**Versions (760)** \n760.00: Ax760_034_034 \n760.10: Ax760_043_043, Ax760_043_034, AM760_044_034 \n760.11: Ax760_051_034 \n760.20: AM760_062_034, AH760_062_043 \n760.30: AM760_068_034, AH760_068_043 \n760.31: AM760_069_034, AH760_069_043 \n760.40: AM760_078_034, AH760_078_043 \n \n**760 Platforms Impacted:** \nIBM Power 770 (9117-MMD) \nIBM Power 780(9179-MHD) \nIBM Power ESE(8412-EAD) \nIBM Power 795(9119-FHB) \n \n**Versions (770)** \n770.00: 01AL770_032_032 \n770.10: 01Ax770_038_032 \n770.20: 01Ax770_048_032 \n770.21: 01Ax770_052_032 \n770.22: 01Ax770_055_032 \n770.31: 01Ax770_063_032 \n770.32: 01Ax770_076_032 \n \n770 **Platforms Impacted:** \nIBM Power 780 (9179-MHC) \nIBM Power 770 (9117-MMC) \nIBM Power 760 (9109-RMD) \nIBM Power 750 (8408-E8D) \nIBM PowerLinux 7R4 (8248-L4T) \nIBM PowerLinux 7R2 (8246-L2D) \nIBM PowerLinux 7R2 (8246-L2T) \nIBM PowerLinux 7R1 (8246-L1D) \nIBM PowerLinux 7R1 (8246-L1T) \nIBM Power 740 (8205-E6D) \nIBM Power 730 (8231-E2D) \nIBM Power 720 (8202-E4D) \nIBM Power 720 (8202-40A) \nIBM Power 710 (8231-E1D) \nIBM Power 710 (8268-E1D) \n \n**Versions (773)** \n773.00: 01AF773_033_033 \n773.01: 01AF773_035_033 \n773.10: 01AF773_051_033 \n773.11: 01AF773_054_033 \n773.12: 01AF773_056_033 \n \n**773 Impacted Versions:** \nIBM Flex System p270 (7954-24X) \nIBM Flex System p260 (7895-23X) \nIBM Flex System p260 (7895-23A) \nIBM Flex System p460 (7895-43X) \nIBM Flex System p260 (7895-22X) \nIBM Flex System p460 (7895-42X) \nIBM Flex System p24L (1457-7FL) \n \n**Versions (780):** \n780.00: 01Ax780_040_040 \n780.01: 01Ax780_050_040 \n780.02: 01Ax780_054_040 \n780.10: 01Ax780_056_040 \n \n**780**** P****latforms Impacted:** \nIBM Power 770 (9117-MMB) \nIBM Power 780 (9179-MHB) \nIBM Power 770 (9117-MMD) \nIBM Power 780 (9179-MHD) \nIBM Power ESE (8412-EAD) \nIBM Power 795 (9119-FHB) \n \n**Versions (783)** \n783.00: AF783_021_021 \n \n**783 Platforms Impacted:** \nIBM Flex System p260 Compute Node (7895-22X) \nIBM Flex System p460 Compute Node (7895-42X) \nIBM Flex System p24L Compute Node (1457-7FL) \nIBM Flex System p260 Compute Node (7895-23X) \nIBM Flex System p260 Compute Node (7895-23A)/FC EFD9 \nIBM Flex System p460 Compute Node (7895-43X) \nIBM Flex System p270 Compute Node (7954-24X) \n \n**Versions (810)** \n810.00: 01SV810_054_054 \n \n**810 Platforms Impacted:** \nIBM Power System S822 (8284-22A) \nIBM Power System S814 (8286-41A) \nIBM Power System S824 (8286-42A) \nIBM Power System S822L (8247-22L)\n\n## Remediation/Fixes\n\nCustomers on Version 350, upgrade to 350.E0: 01Ex350_159 or higher. \nCustomers on Version 730, upgrade to 730.91: 01Ax730_142 or higher. \nCustomers on Version 740, upgrade to 740.81: 01Ax740_152 or higher. \nCustomers on Version 760, upgrade to 760.41: Ax760_079 or higher. \nCustomers on Version 770, upgrade to 770.40: 01Ax770_090 or higher. \nCustomers on Version 773, upgrade to 773.13: 01AF773_058 or higher. \nCustomers on Version 780, upgrade to 780.11: 01Ax780_059 or higher. \nCustomers on Version 783.00, upgrade to 783.01: 01AF783_022 or higher. \nCustomers on Version 810.00, upgrade to 810.01: 01SV810_052 or higher. \n \nThe fix can be obtained from [_FixCentral_](<http://www-933.ibm.com/support/fixcentral/>) by providing the MTM and current fix level.\n\n## Workarounds and Mitigations\n\nNone known\n\n## Get Notified about Future Security Bulletins\n\nSubscribe to [My Notifications](< http://www-01.ibm.com/software/support/einfo.html>) to be notified of important product support alerts like this.\n\n### References \n\n[Complete CVSS v2 Guide](<http://www.first.org/cvss/v2/guide> \"Link resides outside of ibm.com\" ) \n[On-line Calculator v2](<http://nvd.nist.gov/CVSS-v2-Calculator> \"Link resides outside of ibm.com\" )\n\nOff \n\n * [__On-line Calculator V2__](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n * [__OpenSSL Project vulnerability website__](<http://www.openssl.org/news/vulnerabilities.html>)\n\n## Related Information\n\n[IBM Secure Engineering Web Portal](<http://www.ibm.com/security/secure-engineering/bulletins.html>) \n[IBM Product Security Incident Response Blog](<http://www.ibm.com/blogs/psirt>)\n\n[_IBM Secure Engineering Web Portal _](<https://www-304.ibm.com/jct03001c/security/secure-engineering/>) \n[_IBM Product Security Incident Response Blog_](<https://www.ibm.com/blogs/PSIRT>)\n\n## Acknowledgement\n\nNone\n\n## Change History\n\n06/24/14: Information for Versions 780, 783 and 810 published. \n06/25/14: Information for Versions 350, 730, 740 and 760 added. \n06/27/14: Information for Version 770 added. \n07/03/14: Information for Version 773 added. \n \n \n \n \n*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. \n \nDisclaimer \n \nAccording to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.\n\n## Disclaimer\n\nAccording to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"\"AS IS\"\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other efforts to address potential vulnerabilities, IBM periodically updates the record of components contained in our product offerings. As part of that effort, if IBM identifies previously unidentified packages in a product/service inventory, we address relevant vulnerabilities regardless of CVE date. Inclusion of an older CVEID does not demonstrate that the referenced product has been used by IBM since that date, nor that IBM was aware of a vulnerability as of that date. We are making clients aware of relevant vulnerabilities as we become aware of them. \"Affected Products and Versions\" referenced in IBM Security Bulletins are intended to be only products and versions that are supported by IBM and have not passed their end-of-support or warranty date. Thus, failure to reference unsupported or extended-support products and versions in this Security Bulletin does not constitute a determination by IBM that they are unaffected by the vulnerability. Reference to one or more unsupported versions in this Security Bulletin shall not create an obligation for IBM to provide fixes for any unsupported or extended-support products or versions.\n\n[{\"Type\":\"MASTER\",\"Line of Business\":{\"code\":\"LOB57\",\"label\":\"Power\"},\"Business Unit\":{\"code\":\"BU058\",\"label\":\"IBM Infrastructure w\\/TPS\"},\"Product\":{\"code\":\"SWG60\",\"label\":\"IBM i\"},\"Platform\":[{\"code\":\"PF012\",\"label\":\"IBM i\"}],\"Version\":\"7.1.0\"}]", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-12-18T14:26:38", "type": "ibm", "title": "Security Bulletin: Power Systems Firmware is affected by the following OpenSSL vulnerabilities: (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2019-12-18T14:26:38", "id": "FB3709EBFC8A5FAB2E4236B7D00B54901E29184F499A4CDC2801BEC9E4905342", "href": "https://www.ibm.com/support/pages/node/645503", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-05-27T13:36:11", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Vulnerability Details\n\n[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_http://xforce.iss.net/xforce/xfdb/93586_](<http://xforce.iss.net/xforce/xfdb/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nAll TS2900 tape libraries with firmware version lower than 0033.\n\n## Remediation/Fixes\n\nApply firmware version 0033 or later, available from IBM Fix Central \n<http://www-933.ibm.com/support/fixcentral/>\n\n## Workarounds and Mitigations\n\nNone known.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2023-03-26T01:04:50", "type": "ibm", "title": "Security Bulletin: TS2900 is affected by the following OpenSSL vulnerabilities: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2023-03-26T01:04:50", "id": "C62E2592B0FCAE9D52C20B9C7B33E6431777A77035FEB591505DA1F783B680C2", "href": "https://www.ibm.com/support/pages/node/689637", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-05-27T13:36:10", "description": "## Summary\n\nAn attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.\n\n## Vulnerability Details\n\n## Security Bulletin\n\n## Summary\n\nSecurity vulnerability in OpenSSL\n\n## Vulnerability Details\n\n**CVE ID:** CVE-2014-0224 \n**DESCRIPTION**: SSL/TLS MITM vulnerability \n \nAn attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. \n \nThe attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. SVC and Storwize systems use OpenSSL server functionality and some versions are vulnerable (see below). \n \n[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_http://xforce.iss.net/xforce/xfdb/93586_](<http://xforce.iss.net/xforce/xfdb/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\n * IBM SAN Volume Controller\n * Storwize V7000 for Lenovo\n * Storwize V5000 for Lenovo\n * Storwize V3700 for Lenovo\n * Storwize V3500 for Lenovo\nAll products are affected when running code releases 6.4, 7.1, 7.2 and 7.3 except for versions 6.4.1.10, 7.1.0.10, 7.2.0.7 or 7.3.0.3 and above. \n\n## Remediation/Fixes\n\nFor IBM SAN Volume Controller, IBM Storwize V7000, V5000, V3700 and V3500, install the following code levels or higher:\n\n * 7.1.0.10\n * 7.2.0.7\n * 7.3.0.3\n\nGet the latest\n\n * [ _Latest SAN Volume Controller Code_](<http://www-01.ibm.com/support/docview.wss?rs=591&uid=ssg1S1001707>)\n * [ _Latest Storwize V7000 Code_](<http://www.ibm.com/support/fixcentral/swg/quickorder?parent=Lenovo+RackSwitches+and+Storage+devices&product=ibm/Storage_Disk/Storwize+V7000+for+Lenovo&release=7.5&platform=All&function=all&source=fc>)\n * [ _Latest Storwize V5000 Code_](<http://www.ibm.com/support/fixcentral/swg/quickorder?parent=Lenovo+RackSwitches+and+Storage+devices&product=ibm/Storage_Disk/Storwize+V5000+for+Lenovo&release=7.5&platform=All&function=all&source=fc>)\n * [ _Latest Storwize V3700 Code_](<http://www.ibm.com/support/fixcentral/swg/quickorder?parent=Lenovo+RackSwitches+and+Storage+devices&product=ibm/Storage_Disk/Storwize+V3700+for+Lenovo&release=7.5&platform=All&function=all&source=fc>)\n * [ _Latest Storwize V3500 Code_](<http://www.ibm.com/support/fixcentral/swg/quickorder?parent=Lenovo+RackSwitches+and+Storage+devices&product=ibm/Storage_Disk/Storwize+V3500+for+Lenovo&release=7.5&platform=All&function=all&source=fc>)\n\n## Workarounds and Mitigations\n\nEnsure that all users who have access to the system are authenticated by another security system such as a firewall.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2023-03-26T03:17:46", "type": "ibm", "title": "Security Bulletin: OpenSSL vulnerability in IBM SAN Volume Controller and Lenovo Storwize Family (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2023-03-26T03:17:46", "id": "DCDB6EA346DCAA8866D2DBE2D261DF12A599850328EA9E684CDBA078BDF350A0", "href": "https://www.ibm.com/support/pages/node/867400", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-05-27T13:35:59", "description": "## Summary\n\nSecurity vulnerability in OpenSSL\n\n## Vulnerability Details\n\n**CVEID: **CVE-2014-0224 \n \n**DESCRIPTION**: SSL/TLS MITM vulnerability \n \nAn attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. \n \nThe attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. SVC and Storwize systems use OpenSSL server functionality and some versions are vulnerable (see below). \n \n[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_http://xforce.iss.net/xforce/xfdb/93586_](<http://xforce.iss.net/xforce/xfdb/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nIBM SAN Volume Controller \nIBM Storwize V7000 \nIBM Storwize V5000 \nIBM Storwize V3700 \nIBM Storwize V3500 \n \nAll products are affected when running code releases 6.4, 7.1, 7.2 and 7.3 except for versions 6.4.1.10, 7.1.0.10, 7.2.0.7 or 7.3.0.3 and above.\n\n## Remediation/Fixes\n\nFor IBM SAN Volume Controller, IBM Storwize V7000, V5000, V3700 and V3500, install the following code levels or higher: \n \n7.1.0.10 \n7.2.0.7 \n7.3.0.3 \n \n[_Latest SAN Volume Controller Code_](<http://www-01.ibm.com/support/docview.wss?rs=591&uid=ssg1S1001707>) \n[_Latest Storwize V7000 Code_](<http://www-01.ibm.com/support/docview.wss?uid=ssg1S1003705>) \n[_Latest Storwize V5000 Code_](<http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004336>) \n[_Latest Storwize V3700 Code_](<http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004172>) \n[_Latest Storwize V3500 Code_](<http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004171>)\n\n## Workarounds and Mitigations\n\nEnsure that all users who have access to the system are authenticated by another security system such as a firewall.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2023-03-29T01:48:02", "type": "ibm", "title": "Security Bulletin: OpenSSL vulnerability in IBM SAN Volume Controller and Storwize Family (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2023-03-29T01:48:02", "id": "D4D42F15E592E98F112EFA53B5158D86EA79E4A7294251AB7991615DF7CA6494", "href": "https://www.ibm.com/support/pages/node/689665", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-13T05:38:44", "description": "## Summary\n\nSecurity vulnerability in OpenSSL.\n\n## Vulnerability Details\n\n**CVEID: **CVE-2014-0224 \n \n**DESCRIPTION**: SSL/TLS MITM vulnerability \n \nAn attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. \n \nThe attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Storwize V7000 Unified systems use OpenSSL server functionality and some versions are vulnerable (see below). \n \n[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_http://xforce.iss.net/xforce/xfdb/93586_](<http://xforce.iss.net/xforce/xfdb/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nIBM Storwize V7000 Unified \n \nAll versions are affected when running code releases 1.3 and 1.4 except for versions 1.4.3.3 and above.\n\n## Remediation/Fixes\n\nFor IBM Storwize V7000 Unified install the following code levels or higher: \n1.5.0.0 \n1.4.3.3 \n \n[_Latest Storwize V7000 Unified Software_](<http://www-01.ibm.com/support/docview.wss?uid=ssg1S1003918&myns=s028&mynp=OCST5Q4U&mync=E>)\n\n## Workarounds and Mitigations\n\nEnsure that all users who have access to the system are authenticated by another security system such as a firewall\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-18T00:08:14", "type": "ibm", "title": "Security Bulletin: OpenSSL vulnerability in IBM Storwize V7000 Unified (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-18T00:08:14", "id": "C99D1694993A63B13B3DCDE59C9A05AD82DBBD904140AE1DFD691BB96CB5D0D2", "href": "https://www.ibm.com/support/pages/node/689765", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T01:39:41", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93586_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nIBM Netezza Platform Software 6.0.8.17 and earlier \nIBM Netezza Platform Software 7.0.2.13 and earlier \nIBM Netezza Platform Software 7.0.4.5 and earlier \nIBM Netezza Platform Software 7.1.0.2 and earlier\n\n## Remediation/Fixes\n\n_Product_\n\n| _VRMF_| _Remediation/First Fix_ \n---|---|--- \n_IBM Netezza Platform Software_| _6.0.8.17-P1_| ([_Link to fix pack_](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Information%2BManagement&product=ibm/Information+Management/Netezza+NPS+Software+and+Clients&release=NPS_6.0.8&platform=All&function=all>)) \n_IBM Netezza Platform Software_| _7.0.2.13-P1_| ([_Link to fix pack_](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Information%2BManagement&product=ibm/Information+Management/Netezza+NPS+Software+and+Clients&release=NPS_7.0.2&platform=All&function=all>)) \n_IBM Netezza Platform Software_| _7.0.4.5-P1_| ([_Link to fix pack_](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Information%2BManagement&product=ibm/Information+Management/Netezza+NPS+Software+and+Clients&release=NPS_7.0.4&platform=All&function=all>)) \n_IBM Netezza Platform Software_| _7.1.0.2-P1_| ([_Link to fix pack_](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Information%2BManagement&product=ibm/Information+Management/Netezza+NPS+Software+and+Clients&release=NPS_7.1.0&platform=All&function=all>)) \n \n## Workarounds and Mitigations\n\nNone known\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-10-17T23:43:20", "type": "ibm", "title": "Security Bulletin: IBM Netezza Platform Software is affected by the following OpenSSL vulnerabilities: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2019-10-17T23:43:20", "id": "DB1D092F7A9003CE3422469DC672EF5AA2F47316275AF699D295717C3F15DF23", "href": "https://www.ibm.com/support/pages/node/246537", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-23T21:53:10", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\nThis Bulletin has been moved to the following document.[Security Bulletin: IBM System Networking switches that are affected by the OpenSSL vulnerability: CVE-2014-0224](<864836>)\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-01-31T01:20:02", "type": "ibm", "title": "Security Bulletin: IBM System Networking RackSwitch G8264CS and IBM Flex System Interconnect Fabric are affected by the following OpenSSL vulnerability: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2019-01-31T01:20:02", "id": "AB9F0430D887FE1CB3D902BE374861E5EBA5D4E67EEA7CD40B8AB08587C5814D", "href": "https://www.ibm.com/support/pages/node/864874", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-23T21:53:10", "description": "## Summary\n\nAn interface on the IBM BladeCenter Advanced Management Module (AMM) may expose user account names and passwords that have been configured on that AMM.\n\n## Vulnerability Details\n\n## Abstract\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Content\n\n**Vulnerability Details:**\n\n**CVE-ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n\n**Description:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic.\n\nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n \n\n\n## Affected products and versions\n\n**Affected Products**\n\n * Flex System Chassis Management Module, Option part number 68Y7029\n * Flex System Enterprise Chassis, Types 7893, 8721, 8724\n\n**Affected Firmware versions**\n\nv2.0.0K, as well as all v1.x versions. This includes all the following:\n\n * 2PET10A2\n * 2PEO10A2\n * 2PET10B\n * 2PEO10B\n * 2PET10G\n * 2PEO10G\n * 2PET10K\n * 2PEO10K\n * 2PET10M\n * 2PEO10M\n * 2PET10P\n * 2PEO10P\n * 2PET10Q\n * 2PEO10Q\n * 2PET12D\n * 2PEO12D\n * 2PET12F\n * 2PEO12F\n * 2PET12G\n * 2PEO12G\n * 2PET12H\n * 2PET12I\n * 2PEO12I\n * 2PET12K\n * 2PEO12K\n\n## Remediation:\n\nIBM recommends updating to Chassis Management Module 2.0.0N (2PET12N) or newer, available on IBM Fix Central. \n\n\n## Workaround(s) & Mitigation(s):\n\nNone known\n\n \n\n\n## References:\n\n * [Complete CVSS Guide](<http://www.first.org/cvss/cvss-guide.html>)\n * [On-line Calculator V2](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n * [OpenSSL Project vulnerability website](<http://www.openssl.org/news/vulnerabilities.html>)\n\n**Related Information:** \n[IBM Secure Engineering Web Portal](<http://www-01.ibm.com/software/test/wenses/security/>) \n[IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/PSIRT>) \n\n\n**Acknowledgement** \nNone\n\n**Change History** \n18 June 2014: Original Version Published \n\n\n* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.\n\nNote: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-01-31T01:20:02", "type": "ibm", "title": "Security Bulletin: IBM Flex System Chassis Management Module (CMM) is affected by the following OpenSSL vulnerability: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2019-01-31T01:20:02", "id": "5D82C7896D3A2D844FCC67DB26AF7BF5E3217169C6708CAC8B3601D8D88C340A", "href": "https://www.ibm.com/support/pages/node/864834", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T01:39:51", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93586_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nIBM Netezza Firmware Diagnostic Tools 4.1.0 and earlier\n\n## Remediation/Fixes\n\nUpgrade the IBM Netezza Firmware Diagnostics Tools to 4.1.1 ([_Link to fix pack_](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Information%2BManagement&product=ibm/Information+Management/Netezza+Platform&release=FDT_4.1&platform=Linux&function=all>)) \n\n## Workarounds and Mitigations\n\nNone known\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-10-17T23:43:20", "type": "ibm", "title": "Security Bulletin: IBM Netezza Firmware Diagnostic Tools is affected by the following OpenSSL vulnerabilities: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2019-10-17T23:43:20", "id": "CD308BBC2004FD814ED626D0557817FE9D5DC154BF37D0B3DA1E81135F3002F1", "href": "https://www.ibm.com/support/pages/node/246579", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T01:51:50", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n**CVE ID: **[**_CVE-2014-0224_**](<https://vulners.com/cve/CVE-2014-0224>) \n** ** \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93586_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\n\\-- IBM InfoSphere Information Server versions 8.0, 8.1, 8.5, 8.7, 9.1 and 11.3 running on all platforms. \n\\-- IBM InfoSphere Data Click version 10.0 running on Linux\n\n## Remediation/Fixes\n\n**_Product_**\n\n| **_VRMF_**| **_APAR_**| **_Remediation/First Fix_** \n---|---|---|--- \nInfoSphere Information Server| 11.3| JR50611| \\--Upgrade to [_DataDirect ODBC drivers version 7.1.4_](<http://www.ibm.com/support/fixcentral/swg/quickorder?&product=ibm/Information+Management/IBM+InfoSphere+Information+Server&function=fixId&fixids=is_ddodbc_7.1.4_server*>) \n\\--Follow the driver post installation steps in [_TechNote_](<http://www-01.ibm.com/support/docview.wss?uid=swg21679867>) \nInfoSphere Data Click| 10.0| JR50611| Contact IBM customer support to obtain the fix. \nInfoSphere Information Server| 9.1| JR50611| \\--Upgrade to [_DataDirect ODBC drivers version 7.1.4_](<http://www.ibm.com/support/fixcentral/swg/quickorder?&product=ibm/Information+Management/IBM+InfoSphere+Information+Server&function=fixId&fixids=is_ddodbc_7.1.4_server*>) \n\\--Follow the driver post installation steps in [_TechNote_](<http://www-01.ibm.com/support/docview.wss?uid=swg21679867>) \nInfoSphere Information Server| 8.7| JR47635 \nJR42587 \nJR50611| \\--Apply IBM InfoSphere Information Server version [_8.7 Fix Pack 2_](<http://www-01.ibm.com/support/docview.wss?uid=swg24034359>) \n\\--Upgrade to [_DataDirect ODBC drivers version 7.1.4_](<http://www.ibm.com/support/fixcentral/swg/quickorder?&product=ibm/Information+Management/IBM+InfoSphere+Information+Server&function=fixId&fixids=is_ddodbc_7.1.4_server*>) \n\\--Follow the driver post installation steps in [_TechNote_](<http://www-01.ibm.com/support/docview.wss?uid=swg21679867>) \nInfoSphere Information Server| 8.5| JR47635 \nJR42587 \nJR50611| \\--Apply IBM InfoSphere Information Server version [_8.5 Fix Pack 3_](<http://www-01.ibm.com/support/docview.wss?uid=swg24033513>) \n\\--Upgrade to [_DataDirect ODBC drivers version 7.1.4_](<http://www.ibm.com/support/fixcentral/swg/quickorder?&product=ibm/Information+Management/IBM+InfoSphere+Information+Server&function=fixId&fixids=is_ddodbc_7.1.4_server*>) \n\\--Follow the driver post installation steps in [_TechNote_](<http://www-01.ibm.com/support/docview.wss?uid=swg21679867>) \nInfoSphere Information Server| 8.1| JR47635 \nJR42587 \nJR50611| \\--Apply IBM InfoSphere Information Server version [_8.1 Fix Pack 2_](<http://www-01.ibm.com/support/docview.wss?uid=swg24028376>) \n\\--Apply the [_ODBC Enterprise stage Patch_](<http://www.ibm.com/support/docview.wss?uid=swg24038251>) \n\\--Apply the [_ODBC Connector Patch_](<http://www.ibm.com/support/docview.wss?uid=swg24038250>) \n\\--Upgrade to [_DataDirect ODBC drivers version 7.1.4_](<http://www.ibm.com/support/fixcentral/swg/quickorder?&product=ibm/Information+Management/IBM+InfoSphere+Information+Server&function=fixId&fixids=is_ddodbc_7.1.4_server*>) \n\\--Follow the driver post installation steps in [_TechNote_](<http://www-01.ibm.com/support/docview.wss?uid=swg21679867>) \nInfoSphere Information Server| 8.0| JR50611| Contact IBM customer support. \n \n## Workarounds and Mitigations\n\nNone known\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-16T14:07:11", "type": "ibm", "title": "Security Bulletin: IBM InfoSphere Information Server and IBM InfoSphere Data Click are affected by the following OpenSSL vulnerability (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-16T14:07:11", "id": "977E11C0A92C10BD76972C7C9D6C70960D8D69E1F990D8BA57FC578826D25E64", "href": "https://www.ibm.com/support/pages/node/245843", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-12T17:35:16", "description": "## Summary\n\nIBM XIV Gen2 is vulnerable to CVE-2014-0224, which exposes users to a man-in-the-middle attack when using CIM-based management. \nThis vulnerability was reported on June 5, 2014 by the OpenSSL project\n\n## Vulnerability Details\n\n \n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_http://xforce.iss.net/xforce/xfdb/93586_](<http://xforce.iss.net/xforce/xfdb/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nAll IBM XIV Gen2 products might be exposed.\n\n## Remediation/Fixes\n\n * * This vulnerability exposes users to a man-in-the-middle attack **only if both client and server **use vulnerable versions of OpenSSL. \n * Although XIV management communicates over SSL, the XIV management traffic is **not** vulnerable to this exposure, since XIV management tools do not use OpenSSL.\n * CIM (Common Information Management) based management **may **be exposed if the CIM client is using an unpatched version of OpenSSL when communicating with XIV.\n * Customers using a CIM-based management product should upgrade the OpenSSL version of their CIM-based management product and/or that of the host running it, per their product vendor\u2019s recommendation.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-18T00:08:27", "type": "ibm", "title": "Security Bulletin: IBM XIV Gen2 OpenSSL vulnerability CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-18T00:08:27", "id": "795893749119A31A3F93542968E02964D1EB0242C9D5657AACC50C3611752FBF", "href": "https://www.ibm.com/support/pages/node/689897", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-12T21:35:12", "description": "## Summary\n\nSecurity vulnerability in OpenSSL\n\n## Vulnerability Details\n\n**CVEID: **CVE-2014-0224 \n \n**DESCRIPTION**: SSL/TLS MITM vulnerability \n \nAn attacker using a carefully crafted handshake can force the use of weak \nkeying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. \n \nThe attack can only be performed between a vulnerable client *and* \nserver. OpenSSL clients are vulnerable in all versions of OpenSSL. _FlashSystem V840 product model number AC0 nodes_ use OpenSSL server functionality and some versions are vulnerable (see below). \n \n[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_http://xforce.iss.net/xforce/xfdb/93586_](<http://xforce.iss.net/xforce/xfdb/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nIBM _FlashSystem V840 product, model number AC0 node_ \n \nAll products are affected when running code releases 7.2 and 7.3 except for versions, 7.2.0.7 or 7.3.0.3 and above.\n\n## Remediation/Fixes\n\nFor IBM _FlashSystem V840 product, model number AC0 node_, install the following code levels or higher: \n \n7.2.0.7 \n7.3.0.3 \n \n[_Latest FlashSystem V840 Code_](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=Flash%2Bhigh%2Bavailability%2Bsystems&product=ibm/StorageSoftware/IBM+FlashSystem+V840&release=All&platform=All&function=all>)\n\n## Workarounds and Mitigations\n\nEnsure that all users who have access to the system are authenticated by another security system such as a firewall\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-18T00:08:27", "type": "ibm", "title": "Security Bulletin: OpenSSL vulnerability in IBM FlashSystem V840 product model number AC0 node (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-18T00:08:27", "id": "22EF579ABF10D6BE51F6374F8EEA97E876AB8064F5D5A95CF9CCD82597C29694", "href": "https://www.ibm.com/support/pages/node/689887", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-12T21:35:18", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \nIBM XIV Gen3 Storage System is exposed to CVE-2014-0224.\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify management traffic only. \nUser data is not exposed. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_http://xforce.iss.net/xforce/xfdb/93586_](<http://xforce.iss.net/xforce/xfdb/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nXIV Gen3 systems running 11.3 and 11.4 code versions\n\n## Remediation/Fixes\n\n**The vulnerability has been addressed in releases 11.3.1.c and 11.4.2.a.**\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-18T00:08:06", "type": "ibm", "title": "Security Bulletin: IBM XIV Gen3 Storage System is exposed to the following OpenSSL vulnerability: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-18T00:08:06", "id": "F3EC83D03F65B87B7DF5D40C831F5F89776AFB137FFB46E2BC3300AF3C9CC347", "href": "https://www.ibm.com/support/pages/node/689651", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:46:36", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n \nThis bulletin was updated on 17 Dec 2014. See Change History below for a summary of the changes.\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See _<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>_ for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nThis security exposure affects network connections between the Tivoli Storage Manager client and VMware or NetApp services only and affects the Tivoli Storage Manager Backup-Archive client at these release levels: \n\n * **7.1: **7.1.0.0 through 7.1.0.x\n * **6.4**: 6.4.0.0 through 6.4.2.0\n * **6.3**: 6.3.0.0 through 6.3.2.1\n * **6.2**: all levels\n * **6.1**: all levels. TSM 6.1 is beyond End of Support. \n\n\n## Remediation/Fixes\n\nFor VMware, you can apply the VMware patch to your affected ESXi servers as documented in the VMware security advisory (see <http://www.vmware.com/security/advisories/VMSA-2014-0006.html>) which prevents clients from having the security exposure, or you can apply the fixing level indicated in the following table to fix the client. \n \nFor NetApp, apply the fixing level indicated in the following table. \n\n\n**_TSM_** \n**_Release_**| **_First Fixing VRMF Level_**| **_Client_** \n**_Platform_**| **_APAR_**| **_Link to first fixing level_** \n---|---|---|---|--- \n7.1| 7.1.1.0| AIX \nLinux x86 \nWindows x64| None| [_http://www.ibm.com/support/docview.wss?uid=swg24038141_](<http://www.ibm.com/support/docview.wss?uid=swg24038141>) \n6.4 \n \n \n \n| 6.4.2.1 \n \n \n \n| AIX \nLinux x86 \nWindows x32 \nWindows x64| None \n \n \n \n| [](<http://www-01.ibm.com/support/docview.wss?uid=swg24038504>)[](<http://www-01.ibm.com/support/docview.wss?uid=swg24038504>)[_http://www.ibm.com/support/docview.wss?uid=swg24038504_](<http://www.ibm.com/support/docview.wss?uid=swg24038504>) \n[](<http://www-01.ibm.com/support/docview.wss?uid=swg24038504>) \n \n \n \n6.3| 6.3.2.2| AIX \nLinux x86 \nWindows x32 \nWindows x64| None| [_http://www.ibm.com/support/docview.wss?uid=swg24037930_](<http://www.ibm.com/support/docview.wss?uid=swg24037930>) \n6.2 and 6.1| \n| \n| \n| Upgrade to 6.3 (6.3.2.2 or higher), 6.4 (6.4.2.1 or higher), or 7.1 (7.1.1.0 or higher). \n \n\n\n## Workarounds and Mitigations\n\nNone\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-17T14:53:16", "type": "ibm", "title": "Security Bulletin: Tivoli Storage Manager is affected by the following OpenSSL vulnerability: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-17T14:53:16", "id": "BF6ADD5EA2EA3FD40928D5802D8D489B0E359385BE9E5B5FD93833A33C18D060", "href": "https://www.ibm.com/support/pages/node/519829", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T21:42:49", "description": "## Summary\n\nIBM Tivoli Common Reporting (TCR) interim fixes address Security Vulnerability and Exposure CVE-2014-0224\n\n## Vulnerability Details\n\n**Security Vulnerability and Exposure CVE-2014-0224****:** OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.\n\n## Affected Products and Versions\n\nTCR 2.1 / 2.1.1 /** **2.1.1.2** **(32 bit) \n\nTCR 3.1.0.0 / 3.1.0.1 / 3.1.0.2 (64 bit)\n\n## Remediation/Fixes\n\nIn order to address the security vulnerability, TCR Customers are advised to apply the relevant interim fixes on all their TCR environments. The table below provides the interim fix details for different releases of TCR along with the FixCentral links for download. \n \nTCR Version | Interim Fix (IF) Name | Download Options \n[What is Fix Central (FC) ?](<http://www-947.ibm.com/systems/support/fixes/en/fixcentral/help/faq_sw.html>) \n---|---|--- \nTCR 2.1 | 2.1.0.0-TIV-TCR-<OS>-IF9 | [FC](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Tivoli&product=ibm/Tivoli/IBM+Tivoli+Common+Reporting&release=2.1.0.0&platform=All&function=all>) \nTCR 2.1.1 | 2.1.1.0-TIV-TCR-<OS>-IF16 | [FC](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Tivoli&product=ibm/Tivoli/IBM+Tivoli+Common+Reporting&release=2.1.1.0&platform=All&function=all>) \nTCR 2.1.1.2 | 2.1.1.2-TIV-TCR-<OS>-IF2 | [FC](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Tivoli&product=ibm/Tivoli/IBM+Tivoli+Common+Reporting&release=2.1.1.2&platform=All&function=all>) \nTCR 3.1.0.0 | 1.1.0.0-Tivoli-JazzSM-TCR-<OS>-IF0002 | [FC](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Tivoli&product=ibm/Tivoli/Jazz+for+Service+Management&release=1.1&platform=All&function=all>) \nTCR 3.1.0.1 | 1.1.0.0-Tivoli-JazzSM-TCR-<OS>-IF0002 | [FC](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Tivoli&product=ibm/Tivoli/Jazz+for+Service+Management&release=1.1&platform=All&function=all>) \nTCR 3.1.0.2 | 1.1.0.0-Tivoli-JazzSM-TCR-<OS>-IF0002 | [FC](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Tivoli&product=ibm/Tivoli/Jazz+for+Service+Management&release=1.1&platform=All&function=all>) \n \n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-12-19T15:42:02", "type": "ibm", "title": "Security Bulletin: IBM Tivoli Common Reporting (TCR) interim fixes address Security Vulnerability and Exposure CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2019-12-19T15:42:02", "id": "6FFD4ECF8DCC57EF9DC0F0255D9BCFA3C6DAE2B345F43F4F793E662D954D6A86", "href": "https://www.ibm.com/support/pages/node/714145", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:49:28", "description": "## Summary\n\nSecurity vulnerabilities which impact IBM Rational Build Forge have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n| **Subscribe to My Notifications to be notified of important product support alerts like this.**\n\n * Follow [this link](<https://www.ibm.com/systems/support/myview/subscription/css.wss/subscriptions?methodName=startSearchToSubscribe&uctug_rational_dcfsbblurb_2013-11-05_myn_adoption_promo>) for more information (requires login with your IBM ID) \n---|--- \n \n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**Description: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \n**CVSS Base Score:** 5.8 \n**CVSS Temporal Score:** See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \n**CVSS Environmental Score*:** Undefined \n**CVSS Vector:** (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n\n## Affected Products and Versions\n\nRational Build Forge: 8.0,8.0.0.1,8.0.0.2\n\n## Remediation/Fixes\n\nApply the correct iFix for your version of Build Forge: \n\n**Affected Version**| **Fix** \n---|--- \nBuild Forge 8.0.0.0 - 8.0.0.2| [Rational Build Forge 8.0.0.2 iFix1](<https://jazz.net/downloads/rational-build-forge/releases/8.0.0.2iFix1>) \n \n## Workarounds and Mitigations\n\nUpgrade the openSSL in Build Forge install directory on the Build Forge console machine.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-17T04:55:52", "type": "ibm", "title": "Security Bulletin:Build Forge is affected by the following OpenSSL vulnerabilities (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-17T04:55:52", "id": "BC384152407B343963B31F99342DB0843E3DCFC77A639F5A6C93C763DCD8C361", "href": "https://www.ibm.com/support/pages/node/515681", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T01:52:52", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project\n\n## Vulnerability Details\n\nCVE-ID: [_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \nDESCRIPTION: OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>)<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\n \nIBM Cognos TM1 9.5.2.3 \nIBM Cognos TM1 10.1.1.2 \nIBM Cognos TM1 10.2.0.2 \nIBM Cognos TM1 10.2.2\n\n## Remediation/Fixes\n\nThe recommended solution is to apply the fix in the versions listed as soon as practical: \n[_9.5.2.3 IF5_](<http://www.ibm.com/support/docview.wss?uid=swg24037742>) \n[_10.1.1.2 IF1_](<http://www.ibm.com/support/docview.wss?uid=swg24037745>) \n[_10.2.0.2 IF1 _](<http://www.ibm.com/support/docview.wss?uid=swg24037941>) \n[_10.2.2.0 IF1_](<http://www.ibm.com/support/docview.wss?uid=swg24037945>)\n\n## Workarounds and Mitigations\n\nNone known\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-15T22:32:47", "type": "ibm", "title": "Security Bulletin: IBM Cognos TM1 is affected by the following OpenSSL vulnerabilities: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-15T22:32:47", "id": "47DEFD4AFBF5C6135E8B5B4A41A5696678BC727C29C83EE122D25C9B5A03D112", "href": "https://www.ibm.com/support/pages/node/248433", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:58:29", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93586_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nIBM WebSphere Cast Iron Solution v7.0.0.0, v6.4.0.x, v6.3.0.x, v6.1.0.x and Interim Fixes on both physical appliance and virtual appliance affected.\n\n## Remediation/Fixes\n\n_Product_\n\n| _VRMF_| _APAR_| _Remediation/First Fix_ \n---|---|---|--- \n_CastIron Appliance_| 7.0.0.0 upto iFix 7.0.0.0-CUMUIFIX-006| _LI78043_| iFix [7.0.0.0-CUMUIFIX-007](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+Cast+Iron+Cloud+integration&release=7.0.0.0&platform=All&function=fixId&fixids=7.0.0.0-WS-WCI-20140617-1452_H7_64-CUMUIFIX-007.scrypt2,7.0.0.0-WS-WCI-20140617-1452_H7_64-CUMUIFIX-007.vcrypt2&includeSupersedes=0>) available in FixCentral. \n_CastIron Appliance_| 6.4.0.0 and all iFixes \n6.4.0.1 upto iFix 6.4.0.1-CUMUIFIX-016| _LI78043_| iFix [6.4.0.1-CUMUIFIX-018](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+Cast+Iron+Cloud+integration&release=6.4.0.1&platform=All&function=fixId&fixids=6.4.0.1-WS-WCI-20140613-2101_H6-CUMUIFIX-018.scrypt2,6.4.0.1-WS-WCI-20140613-2101_H6-CUMUIFIX-018.vcrypt2&includeSupersedes=0>) available in FixCentral. \n_CastIron Appliance_| 6.3.0.0 and all iFixes \n6.3.0.1 and all iFixes \n6.3.0.2 upto iFix 6.3.0.2-CUMUIFIX-005| _LI78043_| iFix [6.3.0.2-CUMUIFIX-006](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+Cast+Iron+Cloud+integration&release=6.3.0.2&platform=All&function=fixId&fixids=6.3.0.2-WS-WCI-20140616-0752_H6-CUMUIFIX-006.scrypt2,6.3.0.2-WS-WCI-20140616-0752_H6-CUMUIFIX-006.vcrypt2&includeSupersedes=0>) available in FixCentral. \n_CastIron Appliance_| 6.1 and all fixpacks upto 6.1.0.12 and iFixes \n6.1.0.15 upto iFix 6.1.0.15-CUMUIFIX-012| _LI78043_| iFix [6.1.0.15-CUMUIFIX-013](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+Cast+Iron+Cloud+integration&release=6.1.0.15&platform=All&function=fixId&fixids=6.1.0.15-WS-WCI-20140616-0820_H3-CUMUIFIX-013.scrypt2,6.1.0.15-WS-WCI-20140616-0820_H3-CUMUIFIX-013.vcrypt2&includeSupersedes=0>) available in FixCentral. \n \n## Workarounds and Mitigations\n\nNone known\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-15T07:00:52", "type": "ibm", "title": "Security Bulletin: IBM WebSphere Cast Iron Solution is affected by OpenSSL vulnerabilities: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-15T07:00:52", "id": "C6B28C931C466E796578281CD37B305873B7FE393385A42BC60DE4B83BE27288", "href": "https://www.ibm.com/support/pages/node/514371", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T01:52:39", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n**CVE-ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\n * IBM Cognos Business Intelligence Server 10.2.1.1\n * IBM Cognos Business Intelligence Server 10.2.1\n * IBM Cognos Business Intelligence Server 10.2\n * IBM Cognos Business Intelligence Server 10.1.1\n * IBM Cognos Business Intelligence Server 10.1\n * IBM Cognos Business Intelligence Server 8.4.1\n\n## Remediation/Fixes\n\nThe recommended solution is to apply the fix for versions listed as soon as practical. \n\n\n * [Cognos BI 10.2.1.1 IF6, 10.2.1 IF6, and 10.2 IF9](<http://www.ibm.com/support/docview.wss?uid=swg24037870>)\n * [Cognos BI 10.1.1 IF7 and 10.1 IF8](<http://www.ibm.com/support/docview.wss?uid=swg24037974>)\n * [Cognos BI 8.4.1 IF6](<http://www.ibm.com/support/docview.wss?uid=swg24037867>)\n\n## Workarounds and Mitigations\n\nNone known. \n \n**Important note:** IBM strongly suggests that all System z customers subscribe to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the [System z Security web site](<http://www-03.ibm.com/systems/z/solutions/security_subintegrity.html>). Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-15T23:13:32", "type": "ibm", "title": "Security Bulletin: IBM Cognos BI Server is affected by the following OpenSSL vulnerability: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-15T23:13:32", "id": "2CE863E65ABEFAFA04D6B616FD6C357356EDE0C21C92C2269C4AA2F8BB83DC45", "href": "https://www.ibm.com/support/pages/node/246375", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:52:22", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93586_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions\n\nIBM QRadar Security Information and Event Manager (SIEM) appliances (versions 7.1 and 7.2) installed on the following hardware: \n\n\n * IBM X3650 M4 BD (5466) Servers running IMMv2\n * IBM X3550 M4 (7914) Servers running IMMv2\n * IBM X3550 M3 (7944) Servers running IMMv1\n * IBM X3630 M3 (7377) Server running IMMv1\n\n## Remediation/Fixes\n\n * **IBM X3650 M4 BD (5466) - **Update to version 3.76 of the IMMv2 firmware**: \n**[Integrated Management Module 2 (IMM2) Update](<http://www-933.ibm.com/support/fixcentral/systemx/selectFixes?parent=System%2Bx3650%2BM4%2BBD&product=ibm/systemx/5466&&platform=RHEL+6&function=all>)** \\- **ibm_fw_imm2_1aoo56q-3.76_anyos_noarch\n \n\n * **IBM X3550 M4 (7914) - **Update to version 4.31 of the IMMv2 firmware: [ \nIntegrated Management Module 2 (IMM2) Update](<http://www-933.ibm.com/support/fixcentral/systemx/selectFixes?parent=System%2Bx3550%2BM4&product=ibm/systemx/7914&&platform=RHEL+6&function=all>) \\- ibm_fw_imm2_1aoo58t-4.31_anyos_noarch \n \n\n * **IBM X3550 M3 (7944) - **Update to version 1.44 of the IMMv1 firmware**: \n**[Integrated Management Module Update](<http://www-933.ibm.com/support/fixcentral/systemx/selectFixes?parent=System%2Bx3550%2BM3&product=ibm/systemx/7944&&platform=RHEL+6&function=all>)** \\- **ibm_fw_imm_yuoog6c-1.44_linux_32-64 \n \n\n * **IBM X3630 M3 (7377) - **Update to version 1.44 of the IMMv1 firmware**: **[ \nIntegrated Management Module Update](<http://www-933.ibm.com/support/fixcentral/systemx/selectFixes?parent=System%2Bx3630%2BM3&product=ibm/systemx/7377&&platform=RHEL+6&function=all>)** \\- **ibm_fw_imm_yuoog6c-1.44_linux_32-64 \n\n\n## Workarounds and Mitigations\n\nNone\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-16T21:18:20", "type": "ibm", "title": "Security Bulletin: IBM X Series hardware IMMv1, IMMv2 remote management ports as used by IBM QRadar SIEM appliances are affected by the following OpenSSL vulnerabilities: (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-06-16T21:18:20", "id": "968199C9EE6781335729E444E3EF0F665598D9AE8578319DC1C8FD8B09F62646", "href": "https://www.ibm.com/support/pages/node/514987", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:41:47", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL, that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n \n**CVE-ID: **CVE-2014-0224 \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score. \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n\n## Affected Products and Versions\n\nHardware versions affected: \nInfoSphere Guardium Collector X1000 \nInfoSphere Guardium Collector x2000 \nInfoSphere Guardium Aggregator x2000 \nInfoSphere Guardium Collector x2132 \nInfoSphere Guardium Aggregator x2132 \nInfoSphere Guardium Collector x2164 \nInfoSphere Guardium Aggregator x2164 \nInfoSphere Guardium Collector x3064 \nInfoSphere Guardium Aggregator x3064\n\n## Remediation/Fixes\n\n**Pre-requisites: ** \nBefore applying the patch, your system must meet the following requirements: \n1\\. Commands over USB is enabled (this is the default in the System BIOS). System Settings \u2192 Integrated Management Module \u2192 Commands on USB interface <Enabled> \n2\\. Lan-over-USB must be enabled. This is enabled through the IMM system. IMM Management \u2192 Network \u2192 USB. Verify that \u201cEnable Ethernet over USB\u201d is checked and applied. \n \n\n\nFor version 8.2: - Apply the iFix located here: \n[http://www.ibm.com/support/fixcentral/swg/quickorder?product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard-8.2p1025&includeSupersedes=0&source=fc](<http://www.ibm.com/support/fixcentral/swg/quickorder?product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard-8.2p1025&includeSupersedes=0&source=fc>) \nFor all version 9: - Apply the iFix located here: \n[http://www.ibm.com/support/fixcentral/swg/quickorder?product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard-9.0p1037&includeSupersedes=0&source=fc](<http://www.ibm.com/support/fixcentral/swg/quickorder?product=ibm/Information+Management/InfoSphere+Guardium&release=All&platform=All&function=fixId&fixids=SqlGuard-9.0p1037&includeSupersedes=0&source=fc>) \n--- \n \n## Workarounds and Mitigations\n\nNone known \n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-07-16T10:15:46", "type": "ibm", "title": "Security Bulletin: IBM InfoSphere Guardium System x/Flex Systems appliances are affected by vulnerabilities in OpenSSL: CVE-2014-0224", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-07-16T10:15:46", "id": "E87A24ECF979DFDBF04206EC90886CBC1EE9EA0160492786B800F488C8B8FA82", "href": "https://www.ibm.com/support/pages/node/515747", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-12T21:35:13", "description": "## Summary\n\nSecurity vulnerability has been discovered in OpenSSL. \n\n## Vulnerability Details\n\n**CVE-ID: **CVE-2014-0224[](<https://vulners.com/cve/CVE-2013-4353>)\n\n**DESCRIPTION: **FlashSystem V840-AE1 uses OpenSSL to protect connection from external management applications which use SMI-S to its CIM client. \n\nAffected versions of OpenSSL do not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, a.k.a. the \"CCS Injection\" vulnerability.\n\nAn attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.\n\nThe attack can only be performed between a vulnerable client *and* a vulnerable server. However, as of when this CVE was posted, all OpenSSL clients were vulnerable (i.e. in all versions of OpenSSL). And in code levels before 1.1.2.0, the FlashSystem 840 has a vulnerable OpenSSL server. \n\nCVSS v2 Base Score: **6.8** \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> \nCVSS Vector: (AV:N/AC:M/AU:N/C:P/I:P/A:P)\n\n## Affected Products and Versions\n\n_FlashSystem V840 including machine type models (all available code levels) _ \n9846-AE1 & 9848-AE1\n\n## Remediation/Fixes\n\n_Products_\n\n| _VRMF_| _APAR_| _Remediation/First Fix_ \n---|---|---|--- \n9846-AE1, \n9848-AE1,| _A code fix is now available, the VRMF of this code level is 1.1.2.2_| _N/A_| _The recommended remediation is to apply this code fix for this OpenSSL vulnerability. _ \n \n## Workarounds and Mitigations\n\nA user could potentially restrict his network so that there is no opportunity for an attacker to insert himself as man-in-the-middle.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-18T00:08:27", "type": "ibm", "title": "Security Bulletin: The IBM V840 product model number AE1 node is affected by a vulnerability in OpenSSL (CVE-2014-0224 = SSL/TLS MITM vulnerability)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-4353", "CVE-2014-0224"], "modified": "2018-06-18T00:08:27", "id": "D585C1C27FAA60AFCFBA21AB71C44FE7E8CC0493A74A65C2F8E14EF34B5A0742", "href": "https://www.ibm.com/support/pages/node/689889", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-23T21:53:06", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project\n\n## Vulnerability Details\n\n## Abstract\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project\n\n## Content\n\n**Vulnerability Details:**\n\n**CVE-ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n\n**Description:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n**CVE-ID:** [CVE-2014-0076](<https://vulners.com/cve/CVE-2014-0076>) \n \n**Description:** OpenSSL could allow a local attacker to obtain sensitive information, caused by an implementation error in ECDSA (Elliptic Curve Digital Signature Algorithm). An attacker could exploit this vulnerability using the FLUSH+RELOAD cache side-channel attack to recover ECDSA nonces. \nCVSS Base Score: 2.1 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/91990> \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:L/AC:L/Au:N/C:P/I:N/A:N)\n\n## Affected products and versions\n\n * IBM System x3550M3 type 7944: 1.42 and earlier\n * IBM System x3650M3 type 7945, 7949, 5454: 1.42 and earlier\n * IBM System dx360M3 type 6391: 1.42 and earlier\n * IBM System x3630M3 type 7377: 1.42 and earlier\n * IBM System x3400M3 type 7378, 7379: 1.42 and earlier\n * IBM System x3620M3 type 7376: 1.42 and earlier\n * IBM System x3500M3 type 7380: 1.42 and earlier\n * IBM System x3200M3 type 7327, 7328: 1.42 and earlier\n * IBM System x3250M3 type 4251, 4252: 1.42 and earlier\n * IBM System dx360M2 type 7321, 7323, 7325: 1.42 and earlier\n * IBM System x3550M2 type 7946: 1.42 and earlier\n * IBM System x3650M2 type 7947: 1.42 and earlier\n * IBM System x3400M2 type 7836, 7837: 1.42 and earlier\n * IBM System x3500M2 type 7839: 1.42 and earlier\n * IBM System x3850/x3950 X5 type 7143, 7145: 1.43 and earlier\n * IBM System x3690X5 type 7147, 7148: 1.43 and earlier\n\n## Remediation:\n\nIBM recommends updating IMM to 1.44 YUOOG6C or later. Firmware updates are available through [IBM Fix Central](<http://www.ibm.com/support/fixcentral>). \n\n\n## Workaround(s) & Mitigation(s):\n\nNone\n\n \n\n\n## References:\n\n * [Complete CVSS Guide](<http://www.first.org/cvss/cvss-guide.html>)\n * [On-line Calculator V2](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n * [OpenSSL Project vulnerability website](<http://www.openssl.org/news/vulnerabilities.html>)\n\n**Related Information:** \n[IBM Secure Engineering Web Portal](<http://www-01.ibm.com/software/test/wenses/security/>) \n[IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/PSIRT>) \n\n\n**Acknowledgement** \nNone\n\n**Change History** \n25 June 2014: Original Copy Published \n\n\n* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.\n\nNote: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-01-31T01:25:01", "type": "ibm", "title": "Security Bulletin: IBM System x Integrated Management Module (IMM) is affected by the following OpenSSL vulnerabilities: \nCVE-2014-0224, CVE-2014-0076", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0076", "CVE-2014-0224"], "modified": "2019-01-31T01:25:01", "id": "1FEAE1CB3B5B70F7BE3133CD1D0885CEA3A7450AEF84AA35076B445684DF47B2", "href": "https://www.ibm.com/support/pages/node/864922", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-23T21:53:06", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL\n\n## Vulnerability Details\n\n## Abstract\n\nSecurity vulnerabilities have been discovered in OpenSSL\n\n## Content\n\n**Vulnerability Details:**\n\n**CVE-ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>) \n \n**Description:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n**CVE-ID:** [CVE-2014-3470](<https://vulners.com/cve/CVE-2014-3470>) \n \n**Description:** OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH ciphersuites. A remote attacker could exploit this vulnerability to cause a denial of service. \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93589> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n \n\n\n## Affected products and versions\n\nFrom the IBM System Director command line enter **smcli lsver** to determine the level of IBM System Director installed.\n\nAffected Product and Version(s) | Product and Version shipped as a component \n---|--- \nIBM Systems Director Storage Control 4.2.1.0 | IBM Systems Director 6.2.1.0 \nIBM Systems Director Storage Control 4.2.1.0 | IBM Systems Director 6.2.1.2 \nIBM Systems Director Storage Control 4.2.1.1 | IBM Systems Director 6.3.0.0 \nIBM Systems Director Storage Control 4.2.2.0 | IBM Systems Director 6.3.1.0 \nIBM Systems Director Storage Control 4.2.2.1 | IBM Systems Director 6.3.1.1 \nIBM Systems Director Storage Control 4.2.3.0 | IBM Systems Director 6.3.2.0 \nIBM Systems Director Storage Control 4.2.3.1 | IBM Systems Director 6.3.2.1 \nIBM Systems Director Storage Control 4.2.3.1 | IBM Systems Director 6.3.2.2 \nIBM Systems Director Storage Control 4.2.4.0 | IBM Systems Director 6.3.3.0 \nIBM Systems Director Storage Control 4.2.4.1 | IBM Systems Director 6.3.3.1 \nIBM Systems Director Storage Control 4.2.6.0 | IBM Systems Director 6.3.5.0 \n \n## Remediation:\n\n 1. Visit Fix Central at the following release: [ http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Director&product=ibm/Director/SystemsDirector&release=All&platform=All&function=all](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EDirector&product=ibm/Director/SystemsDirector&release=All&platform=All&function=all>)\n 2. From this location, select the fix package that matches your platform and release. Download the fix package on the IBM Systems Director Server.\n 3. Follow the Instructions beneath the table for your desired version of Storage Control and IBM Systems Director.\nProduct | VRMF | APAR | Associated Technote \n---|---|---|--- \nIBM Systems Director Storage Control | 4.2.1(ISD 6.2.1.x) | IT02752 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 712807477 \nIBM Systems Director Storage Control | 4.2.1.1(ISD 6.3.0.0) | IT02752 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 712807477 \nIBM Systems Director Storage Control | 4.2.2.0(ISD 6.3.1.0) | IT02752 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 712807477 \nIBM Systems Director Storage Control | 4.2.2.1(ISD 6.3.1.1) | IT02752 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 712807477 \nIBM Systems Director Storage Control | 4.2.3(ISD 6.3.2.0) | IT02752 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 712807477 \nIBM Systems Director Storage Control | 4.2.3.1(ISD 6.3.2.1) | IT02752 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 712807477 \nIBM Systems Director Storage Control | 4.2.3.2(ISD 6.3.2.2) | IT02752 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 712807477 \nIBM Systems Director Storage Control | 4.2.4(ISD 6.3.3.0) | IT02752 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 712807477 \nIBM Systems Director Storage Control | 4.2.4(ISD 6.3.3.1) | IT02752 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 712807477 \nIBM Systems Director Storage Control | 4.2.6(ISD 6.3.5.0) | IT02501 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 712807477 \n \n \n\n\n## Workaround(s) & Mitigation(s):\n\nNone known \n\n\n## References:\n\n * [Complete CVSS Guide](<http://www.first.org/cvss/cvss-guide.html>)\n * [On-line Calculator V2](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n * [OpenSSL Project vulnerability website](<http://www.openssl.org/news/vulnerabilities.html>)\n\n**Related Information:** \n[IBM Secure Engineering Web Portal](<http://www-01.ibm.com/software/test/wenses/security/>) \n[IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/PSIRT>) \n\n\n**Acknowledgement** \nNone\n\n**Change History** \n30 June 2014 Original Copy Published\n\n* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.\n\nNote: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-01-31T01:25:01", "type": "ibm", "title": "Security Bulletin: IBM Systems Director Storage Control is affected by vulnerabilities in OpenSSL (CVE-2014-0224 and CVE-2014-3470)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470"], "modified": "2019-01-31T01:25:01", "id": "2C6DABA7C1B929BD0A1C877141E205102890F502DE3D359D434EE3014CB61E71", "href": "https://www.ibm.com/support/pages/node/865154", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-05-27T13:36:55", "description": "## Summary\n\nSecurity vulnerability has been discovered in OpenSSL\n\n## Vulnerability Details\n\n**CVE-ID: **CVE-2014-0224[](<https://vulners.com/cve/CVE-2013-4353>)\n\n**DESCRIPTION: **FlashSystem 840 uses OpenSSL to protect connection from external management applications which use SMI-S to its CIM client. \n\nAffected versions of OpenSSL do not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, a.k.a. the \"CCS Injection\" vulnerability.\n\nAn attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.\n\nThe attack can only be performed between a vulnerable client *and* a vulnerable server. However, as of when this CVE was posted, all OpenSSL clients were vulnerable (i.e. in all versions of OpenSSL). And in code levels before 1.1.2.0, the FlashSystem 840 has a vulnerable OpenSSL server. \n\nCVSS v2 Base Score: **6.8** \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> \nCVSS Vector: (AV:N/AC:M/AU:N/C:P/I:P/A:P)\n\n## Affected Products and Versions\n\n_FlashSystem 840 including machine type models (all available code levels) _ \n9840-AE1 & 9843-AE1\n\n## Remediation/Fixes\n\n_Products_\n\n| _VRMF_| _APAR_| _Remediation/First Fix_ \n---|---|---|--- \n9840-AE1, \n9843-AE1,| _A code fix is now available, the VRMF of this code level is 1.1.2.2_| _N/A_| _The recommended remediation is to apply this code fix for this OpenSSL vulnerability. _ \n \n## Workarounds and Mitigations\n\nA user could potentially restrict his network so that there is no opportunity for an attacker to insert himself as man-in-the-middle.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2023-02-18T01:45:50", "type": "ibm", "title": "Security Bulletin: The IBM FlashSystem 840 product is affected by a vulnerability in OpenSSL (CVE-2014-0224 = SSL/TLS MITM vulnerability)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-4353", "CVE-2014-0224"], "modified": "2023-02-18T01:45:50", "id": "30B85D27D79A842AC5411CD24C5A6C453FC07F21C5E9546CCCC6B99631AFCD79", "href": "https://www.ibm.com/support/pages/node/689759", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-05-27T13:35:57", "description": "## Summary\n\nSecurity Bulletin: Security bypass vulnerability in SAN Volume Controller and Storwize Family (CVE-2014-0094)\n\n## Vulnerability Details\n\n## Security Bulletin \n \n--- \n \nSummary \n--- \n \nSecurity vulnerability in OpenSSL\n\n## Vulnerability Details \n \n--- \n \n**CVEID:** CVE-2014-0224 \n**DESCRIPTION**: SSL/TLS MITM vulnerability \n \nAn attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. \n \nThe attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. SVC and Storwize systems use OpenSSL server functionality and some versions are vulnerable (see below). \n \n[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_http://xforce.iss.net/xforce/xfdb/93586_](<http://xforce.iss.net/xforce/xfdb/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n## Affected Products and Versions \n \n--- \n \nLenovo Storwize V7000 \nLenovo Storwize V5000 \nLenovo Storwize V3700 \nLenovo Storwize V3500 \n \nAll products are affected when running code releases 6.4, 7.1, 7.2 and 7.3 except for versions 6.4.1.10, 7.1.0.10, 7.2.0.7 or 7.3.0.3 and above..\n\n## Remediation/Fixes \n \n--- \n \nFor IBM SAN Volume Controller, IBM Storwize V7000, V5000, V3700 and V3500, install the following code levels or higher: \n \n7.1.0.10 \n7.2.0.7 \n7.3.0.3\n\n \n[_Latest Storwize V7000 Code_](<http://www-01.ibm.com/support/docview.wss?uid=ssg1S1003705>) \n[_Latest Storwize V5000 Code_](<http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004336>) \n[_Latest Storwize V3700 Code_](<http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004172>) \n[_Latest Storwize V3500 Code_](<http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004171>)\n\n## Workarounds and Mitigations \n \n--- \n \nEnsure that all users who have access to the system are authenticated by another security system such as a firewall.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2023-03-29T01:48:02", "type": "ibm", "title": "Security Bulletin: OpenSSL vulnerability in Lenovo SAN Volume Controller and Storwize Family (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0094", "CVE-2014-0224"], "modified": "2023-03-29T01:48:02", "id": "9E30BEC40A5B1EB3EFF9463956D6D4D9746A49D406672F9E4FDA4DB5EA368574", "href": "https://www.ibm.com/support/pages/node/865958", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T01:52:52", "description": "## Summary\n\nIBM WebSphere MQ, IBM Websphere Message Broker and IBM Integration Bus are shipped as components of IBM Predictive Maintenance and Quality. Information about security vulnerabilities affecting IBM WebSphere MQ, IBM Websphere Message Broker and IBM Integration Bus has been published in security bulletins. \n\n\n## Vulnerability Details\n\nPlease consult the security bulletin in [WebSphere MQ is affected by the following OpenSSL vulnerabilities](<http://www.ibm.com/support/docview.wss?uid=swg21676496>) for vulnerability details. \n \n \nPlease consult the security bulletin [IBM Websphere Message Broker and IBM Integration Bus are affected by SSL Vulnerability in DataDirect ODBC drivers](<http://www.ibm.com/support/docview.wss?uid=swg21677891>) for vulnerability details. \n \n\n\n## Affected Products and Versions\n\nAffected Product and Version(s)\n\n| Product and Version shipped as a component \n---|--- \nIBM Predictive Maintenance and Quality 1.0| IBM WebSphere MQ V 7.5 \nIBM Websphere Message Broker V8.0 \nIBM Predictive Maintenance and Quality 2.0| IBM WebSphere MQ V 7.5.0.3 \nIBM Integration Bus V9.0 \n \n## ", "cvss3": {}, "published": "2018-06-15T22:33:16", "type": "ibm", "title": "Security Bulletin: Security vulnerabilities have been identified in IBM WebSphere MQ (CVE-2014-0224, CVE-2014-3470), Websphere Message Broker and IBM Integration Bus (CVE-2014-0224) shipped with Predictive Maintenance and Quality", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470"], "modified": "2018-06-15T22:33:16", "id": "0D459600B092B85E783E0A6371C3E1BFEDCD18BC648ACAA512F5FB9EF050A910", "href": "https://www.ibm.com/support/pages/node/251861", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-02-23T21:53:07", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n## Abstract\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Content\n\n**Vulnerability Details:**\n\n**CVE-ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n\n**Description:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic.\n\nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\n**CVE-ID:** [CVE-2014-3470](<https://vulners.com/cve/CVE-2014-3470>)\n\n**Description:** OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH cipher suites. A remote attacker could exploit this vulnerability to cause a denial of service.\n\nCVSS Base Score: 4.3 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93589> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n \n\n\n## Affected products and versions\n\n * Flex System Manager 1.1.x.x\n * Flex System Manager 1.2.0.x\n * Flex System Manager 1.2.1.x\n * Flex System Manager 1.3.0.x\n * Flex System Manager 1.3.1.x\n * Flex System Manager 1.3.2.x\n\n## Remediation:\n\nProduct | VRMF | APAR | Remediation \n---|---|---|--- \nFlex System Manager | 1.1.x.x | IT02336 | Upgrade to FSM 1.3.2.0 and follow the appropriate remediation, or open a PMR with support to request an APAR. \nFlex System Manager | 1.2.0.x | IT02336 | Upgrade to FSM 1.3.2.0 and follow the appropriate remediation, or open a PMR with support to request an APAR. \nFlex System Manager | 1.2.1.x | IT02336 | Upgrade to FSM 1.3.2.0 and follow the appropriate remediation, or open a PMR with support to request an APAR. \nFlex System Manager | 1.3.0.x | IT02336 | [ fsmfix1.3.0.0_IT02336](<http://www.ibm.com/support/fixcentral/systemx/quickorder?product=ibm/systemx/8731&&platform=All&function=fixId&fixids=fsmfix1.3.0.0_IT02336&includeRequisites=1&includeSupersedes=0&downloadMethod=ddp&source=fc>) \nFlex System Manager | 1.3.1.x | IT02336 | [ fsmfix1.3.1.0_IT02336](<http://www.ibm.com/support/fixcentral/systemx/quickorder?product=ibm/systemx/8731&&platform=All&function=fixId&fixids=fsmfix1.3.1.0_IT02336&includeRequisites=1&includeSupersedes=0&downloadMethod=ddp&source=fc>) \nFlex System Manager | 1.3.2.x | IT02336 | [ fsmfix1.3.2.0_IT02336](<http://www.ibm.com/support/fixcentral/systemx/quickorder?product=ibm/systemx/8731&&platform=All&function=fixId&fixids=fsmfix1.3.2.0_IT02336&includeRequisites=1&includeSupersedes=0&downloadMethod=ddp&source=fc>) \n \n \n\n\n## Workaround(s) & Mitigation(s):\n\nNone known \n\n\n## References:\n\n * [Complete CVSS Guide](<http://www.first.org/cvss/cvss-guide.html>)\n * [On-line Calculator V2](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n * [OpenSSL Project vulnerability website](<http://www.openssl.org/news/vulnerabilities.html>)\n\n**Related Information:** \n[IBM Secure Engineering Web Portal](<http://www-01.ibm.com/software/test/wenses/security/>) \n[IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/PSIRT>) \n\n\n**Acknowledgement** \nNone\n\n**Change History** \n30 July 2014: Original Version Published\n\n* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.\n\nNote: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-01-31T01:25:01", "type": "ibm", "title": "Security Bulletin: IBM Flex System Manager (FSM) is affected by OpenSSL vulnerabilities: (CVE-2014-0224, CVE-2014-3470)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470"], "modified": "2019-01-31T01:25:01", "id": "6B72AABF83EF6FC687B451D40E4BB04D7ADD60EEC056198C0966F70FC80E3FF6", "href": "https://www.ibm.com/support/pages/node/865152", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T21:53:53", "description": "## Summary\n\nA security vulnerability has been discovered in OpenSSL.\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0_](<https://vulners.com/cve/CVE-2014-0160>)[](<https://vulners.com/cve/CVE-2014-0160>)[](<https://vulners.com/cve/CVE-2014-0160>)[](<https://vulners.com/cve/CVE-2014-0160>)_224_ \n \n \n\n\n**DESCRIPTION: **An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. The attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution.\n\nCVSS Base Score: 5.8\n\n \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)[](<http://xforce.iss.net/xforce/xfdb/92322>)\n\n## Affected Products and Versions\n\nIBM SDN VE, Unified Controller, VMware Edition: 1.0.0 \nIBM SDN VE, Unified Controller, KVM Edition: 1.0.0 \nIBM SDN VE, Unified Controller, OpenFlow Edition: 1.0.0 \nIBM SDN VE, Dove Management Console, VMware Edition: 1.0.0 \nIBM SDN VE, Unified Controller, VMware Edition: 1.0.1 \nIBM SDN VE, Unified Controller, KVM Edition: 1.0.1 \nIBM SDN VE, Unified Controller, OpenFlow Edition: 1.0.1 \nIBM SDN VE, Dove Management Console, VMware Edition: 1.0.1\n\n## Remediation/Fixes\n\nIBM recommends updating affected IBM SDN VE, Unified Controllers to the latest versions of IBM SDN VE for which IBM is providing a fix, which are identified below: \n \nIBM SDN VE, Unified Controller, VMware Edition: version 1.0.2 or later \nIBM SDN VE, Unified Controller, KVM Edition: version 1.0.2 or later \nIBM SDN VE, Unified Controller, OpenFlow Edition: version 1.0.2 or later \n**These versions are available via Passport Advantage.**\n\n## Workarounds and Mitigations\n\nNone\n\n## ", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-06-18T01:25:51", "type": "ibm", "title": "Security Bulletin: IBM SDN for Virtual Environments is affected by a vulnerability\nin OpenSSL (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0160", "CVE-2014-0224"], "modified": "2018-06-18T01:25:51", "id": "DD6D1ADB4E0823703EC8B875E430BC4DA6EC03FE4D9BEBF09A0A0BA75C5488A1", "href": "https://www.ibm.com/support/pages/node/679283", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2023-02-21T05:46:10", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n**C****VE-ID: **[](<https://vulners.com/cve/CVE-2014-0224>)[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>[](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n \n \n**CVE-ID: **[](<https://vulners.com/cve/CVE-2014-0195>)[_CVE-2014-0195_](<https://vulners.com/cve/CVE-2014-0195>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a buffer overflow. By sending invalid DTLS packet fragments, a remote attacker could exploit this vulnerability to overrun the client or server and execute arbitrary code on a DTLS client or server. \n \nCVSS Base Score: 7.5 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93588> for the current score \nCVSS Environmental Score*: UndefinedCVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)\n\n## Affected Products and Versions\n\nThis vulnerability is known to affect the following offerings: \n\n * IBM MessageSight Server v1.0 \n * IBM MessageSight Server v1.1\n \nThe vulnerability does **NOT** affect any version or release of the following: \n\n\n * IBM MessageSight JMS Client \n * IBM MessageSight Resource Adaptor\n \nIBM Java JSSE does not use OpenSSL. \n\n## Remediation/Fixes\n\nThe IBM MessageSight Server firmware has been updated to use a newer version of OpenSSL, which contains a fix for the reported OpenSSL vulnerabilities. \n\n**_Product_**| **_VRMF_**| **_Remediation/First Fix_** \n---|---|--- \nIBM MessageSight| 1.x.x.x| 1.1.0.1 \nA firmware update can be downloaded from: [_IBM Support: Fix Central_](<http://www.ibm.com/support/fixcentral/swg/quickorder?product=ibm/Other+software/MessageSight&release=1.0&platform=All&function=fixId&fixids=1.1.0-IMA-Firmware-FP0001&includeRequisites=1&includeSupersedes=0&downloadMethod=http&source=fc>)\n\n## Workarounds and Mitigations\n\nNone\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-17T15:12:13", "type": "ibm", "title": "Security Bulletin: IBM MessageSight is affected by the following OpenSSL vulnerabilities: (CVE-2014-0224, and CVE-2014-0195)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0195", "CVE-2014-0224"], "modified": "2018-06-17T15:12:13", "id": "F14E46DECF8CA0C3C9CF8B2CDAEE5FAB0ECF7815EBF5C422B06AF0DD10EAE2F3", "href": "https://www.ibm.com/support/pages/node/514185", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-21T21:43:26", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n| **Subscribe to My Notifications to be notified of important product support alerts like this.**\n\n * Follow [this link](<https://www.ibm.com/systems/support/myview/subscription/css.wss/subscriptions?methodName=startSearchToSubscribe&uctug_rational_dcfsbblurb_2013-11-05_myn_adoption_promo>) for more information (requires login with your IBM ID) \n---|--- \n \n \n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**Description: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \n**CVSS Base Score:** 5.8 \n**CVSS Temporal Score:** See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \n**CVSS Environmental Score*:** Undefined \n**CVSS Vector:** (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n \n \n**CVE-ID: **[_CVE-2014-3470_](<https://vulners.com/cve/CVE-2014-3470>) \n \n**Description: **OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH ciphersuites. A remote attacker could exploit this vulnerability to cause a denial of service. \n \n**CVSS Base Score:** 4.3 \n**CVSS Temporal Score:** See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93589> for the current score \n**CVSS Environmental Score*:** Undefined \n**CVSS Vector:** (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n## Affected Products and Versions\n\nIBM Rational RequisitePro versions: \n**Version** | **Status** \n---|--- \n7.1.4 through 7.1.4.3 | Affected \n7.1.3 through 7.1.3.10 | Affected \n7.1.0.x, 7.1.1.x (all versions), 7.1.2 through 7.1.2.13 | Affected \n7.0.x | Not Affected \n \nYou are vulnerable if you use ratlperl, ccperl or cqperl to run your own perl scripts, and those scripts use SSL connections.\n\n## Remediation/Fixes\n\nApply a fix pack for your appropriate ReqPro release. These fix packs include OpenSSL 1.0.1h \n**Affected Version** | **Applying the fix** \n---|--- \n7.1.4.x | Install [_Rational RequisitePro Fix Pack 4 (7.1.4.4) for 7.1.4_](<http://www.ibm.com/support/docview.wss?uid=swg24037718>) \n7.1.3.x | Install [_Rational RequisitePro Fix Pack 11 (7.1.3.11) for 7.1.3_](<http://www.ibm.com/support/docview.wss?uid=swg24037717>) \n7.1.2.x | Install [_Rational RequisitePro Fix Pack 14 (7.1.2.14) for 7.1.2_](<http://www.ibm.com/support/docview.wss?uid=swg24037716>) \n7.1.1.x \n7.1.0.x | Install [_Rational RequisitePro Fix Pack 14 (7.1.2.14) for 7.1.2_](<http://www.ibm.com/support/docview.wss?uid=swg24037716>) \n**Note: **7.1.2.14 interoperates with all 7.1.x.x systems, and can be installed in the same way as 7.1.x.x fix packs. \n \n## Workarounds and Mitigations\n\nAvoid usage of ratlperl, ccperl or cqperl with SSL until you apply the fixes listed above.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-10-24T21:46:41", "type": "ibm", "title": "Security Bulletin: Rational RequisitePro affected by OpenSSL vulnerabilities (CVE-2014-0224, CVE-2014-3470)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470"], "modified": "2019-10-24T21:46:41", "id": "E88233319A9D15F2C8C9AF016177554CC5E406313F562544625D459729325F81", "href": "https://www.ibm.com/support/pages/node/714123", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:52:22", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93586_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n \n \n**CVE-ID: **[_CVE-2014-0198_](<https://vulners.com/cve/CVE-2014-0198>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference in the do_ssl3_write() function. If SSL_MODE_RELEASE_BUFFERS is enabled, a remote attacker could exploit this vulnerability to cause the application to crash. \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93000_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93000>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) \n \n**CVE-ID: **[_CVE-2010-5298_](<https://vulners.com/cve/CVE-2010-5298>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by a race condition in the ssl3_read_bytes function. If SSL_MODE_RELEASE_BUFFERS is enabled, an attacker could exploit this vulnerability using an SSL connection in a multithreaded environment to inject data into an SSL stream and cause a denial of service. \n \nCVSS Base Score: 4 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/92632_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/92632>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:H/Au:N/C:N/I:P/A:P)\n\n## Affected Products and Versions\n\n * IBM QRadar Security Information and Event Manager (SIEM) 7.1 MR2 \n * IBM QRadar Security Information and Event Manager (SEIM) 7.2 MR2\n\n## Remediation/Fixes\n\nThe recommended solution is to apply the fix for each named product as soon as practical. Please see below for information about the fixes available. \n \nFor QRadar SIEM 7.1 MR2: \n\\- Upgrade to QRadar SIEM 7.1 MR2 Patch 7 - [7.1.0-QRADAR-QRSIEM-880308](<http://www-933.ibm.com/support/fixcentral/swg/downloadFixes?product=ibm/Other+software/IBM+Security+QRadar+SIEM&release=7.1.0&platform=Linux&function=fixId&fixids=7.1.0-QRADAR-QRSIEM-880308&includeRequisites=1&includeSupersedes=0&downloadMethod=http>) \nFor QRadar SIEM 7.2 MR2: \n\\- Upgrade to QRadar SIEM 7.2 MR2 Patch 3 - [7.2.2-QRADAR-QRSIEM-882822](<http://www-933.ibm.com/support/fixcentral/swg/downloadFixes?product=ibm/Other+software/IBM+Security+QRadar+SIEM&release=7.2.0&platform=Linux&function=fixId&fixids=7.2.2-QRADAR-QRSIEM-882822&includeRequisites=1&includeSupersedes=0&downloadMethod=http>)\n\n## Workarounds and Mitigations\n\nNone\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-16T21:18:17", "type": "ibm", "title": "Security Bulletin: IBM QRadar SIEM 7.1 MR2, and 7.2 MR2 are affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0198, CVE-2010-5298", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-5298", "CVE-2014-0198", "CVE-2014-0224"], "modified": "2018-06-16T21:18:17", "id": "816E910F44E9F5A7F3D7D74AA8CE61178546040EC5759400B76CC57B22E38035", "href": "https://www.ibm.com/support/pages/node/514713", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:41:02", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. The OpenSSL component is shipped as embedded in cqperl. Customers might be affected when there is perl hooks or scripts that are using SSL connections. ClearQuest itself does not provide any service using OpenSSL.\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>)** \nDESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n\nCVSS Base Score: 5.8\n\n \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n\n\n**CVE-ID: **[_CVE-2014-3470_](<https://vulners.com/cve/CVE-2014-3470>)** \nDESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH ciphersuites. A remote attacker could exploit this vulnerability to cause a denial of service. \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See _<https://exchange.xforce.ibmcloud.com/vulnerabilities/93589>_ for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n \n**CVEID:** [_CVE-2015-0292_](<https://vulners.com/cve/CVE-2015-0292>)** \nDESCRIPTION:** OpenSSL could allow a remote attacker to execute arbitrary code on the system, caused by an error when processing base64 encoded data. An attacker could exploit this vulnerability using specially-crafted base 64 data to corrupt memory and execute arbitrary code on the system and cause a denial of service. \nCVSS Base Score: 7.5 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101670_](<https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101670>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) \n\n## Affected Products and Versions\n\nIBM Rational ClearQuest versions: \n \n\n\n**Version**\n\n| \n\n**Status** \n \n---|--- \n \n8.0.1 through 8.0.1.3\n\n| \n\nAffected \n \n8.0 through 8.0.0.10\n\n| \n\nAffected \n \n7.1.0.x, 7.1.1.x (all versions) \n7.1.2 through 7.1.2.13\n\n| \n\nAffected \n \n7.0.x\n\n| \n\nNot affected \n \n## Remediation/Fixes\n\nApply a fix pack for your appropriate release of ClearQuest. These fix packs include OpenSSL 1.0.1h. \n \n\n\n**Affected Versions**\n\n| \n\n** Applying the fix** \n \n---|--- \n \n8.0.1.x\n\n| Install [Rational ClearQuest Fix Pack 4 (8.0.1.4) for 8.0.1](<http://www.ibm.com/support/docview.wss?uid=swg24037663>) \n \n8.0.0.x\n\n| Install [Rational ClearQuest Fix Pack 11 (8.0.0.11) for 8.0](<http://www.ibm.com/support/docview.wss?uid=swg24037662>) \n \n7.1.2.x\n\n| Install [Rational ClearQuest Fix Pack 14 (7.1.2.14) for 7.1.2](<http://www.ibm.com/support/docview.wss?uid=swg24037661>) \n \n7.1.0.x \n7.1.1.x\n\n| Install [Rational ClearQuest Fix Pack 14 (7.1.2.14) for 7.1.2](<http://www.ibm.com/support/docview.wss?uid=swg24037661>)\n\n * **Note:** 7.1.2.14 inter-operates with all 7.1.x.x systems, and can be installed in the same way as 7.1.x.x fix packs. \n \n## Workarounds and Mitigations\n\nDo not use SSL connections in your hooks and script until you apply the fixes listed above.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-09-29T18:04:03", "type": "ibm", "title": "Security Bulletin: Rational ClearQuest is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-3470, CVE-2015-0292", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470", "CVE-2015-0292"], "modified": "2018-09-29T18:04:03", "id": "2DCDC6941748DDE1338B9CCAD748737815ECFE378BB8EC423A60C02D9026304A", "href": "https://www.ibm.com/support/pages/node/513777", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-12T21:35:16", "description": "## Summary\n\n \nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project. \nIBM Real-time Compression Appliance is exposed to CVE-2014-0224, CVE-2014-0198, CVE-2010-5298. \n\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify management traffic only. \nCVSS Base Score: 5.8 \n \n \n**CVE-ID****:** [_CVE-2014-0198_](<https://vulners.com/cve/CVE-2014-0198>) \n**DESCRIPTION: **OpenSSL that has SSL_MODE_RELEASE_BUFFERS enabled, is vulnerable to data injection across sessions or denial of service, by remote attackers via an SSL connection. \nCVSS Base Score: 4.8 \n \n**CVE-ID:** [_CVE-2010-5298_ ](<https://vulners.com/cve/CVE-2010-5298>) \n**DESCRIPTION:** Open SSL is vulnerable to data injection across sessions and denial of service (use-after-free and parsing error) via an SSL connection in a multi threaded environment, caused when SSL_MODE_RELEASE_BUFFERS is enabled. \nCVSS Base Score: 4\n\n## Affected Products and Versions\n\nIBM Real-time Compression Appliance versions: \n4.1.2 \n3.9.1 \n3.8.0\n\n## Remediation/Fixes\n\nCustomers are advised to upgrade to the following releases: 3.8.1.06, 3.9.1.07 or 4.1.2.03 \n \n--- \n \n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-18T00:08:27", "type": "ibm", "title": "Security Bulletin: IBM Real-time Compression Appliance is exposed to the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0198, CVE-2010-5298.", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-5298", "CVE-2014-0198", "CVE-2014-0224"], "modified": "2018-06-18T00:08:27", "id": "572755F417D8C0A349F42ACB777E649E28EA7F5CA30042D3C1C11C887826ED1A", "href": "https://www.ibm.com/support/pages/node/689903", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:42:05", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>)\n\n**Description: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n\n \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n\n\n**CVE-ID: **[_CVE-2014-3470_](<https://vulners.com/cve/CVE-2014-3470>)\n\n**Description: **OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH ciphersuites. A remote attacker could exploit this vulnerability to cause a denial of service.\n\n \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93589> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) \n \n**CVEID:** [_CVE-2015-0292_](<https://vulners.com/cve/CVE-2015-0292>)** \nDESCRIPTION:** OpenSSL could allow a remote attacker to execute arbitrary code on the system, caused by an error when processing base64 encoded data. An attacker could exploit this vulnerability using specially-crafted base 64 data to corrupt memory and execute arbitrary code on the system and cause a denial of service. \nCVSS Base Score: 7.5 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101670_](<https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101670>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) \n\n## Affected Products and Versions\n\nIBM Rational ClearCase versions: \n \n\n\n**Version**\n\n| \n\n**Status** \n \n---|--- \n \n8.0.1 through 8.0.1.3\n\n| \n\nAffected \n \n8.0 through 8.0.0.10\n\n| \n\nAffected \n \n7.1.0.x, 7.1.1.x (all versions) \n7.1.2 through 7.1.2.13\n\n| \n\nAffected \n \n7.0.x\n\n| \n\nNot affected \n \n \nNot all deployments of Rational ClearCase use OpenSSL in a way that is affected by these vulnerabilities. \n \nYou are vulnerable if your use of Rational ClearCase includes _any_ of these configurations: \n\n\n 1. You use the base ClearCase/ClearQuest integration client on any platform, configured to use SSL to communicate with a ClearQuest server. \n\n 2. You use the UCM/ClearQuest integration on UNIX/Linux clients, configured to use SSL to communicate with a ClearQuest server. \n**Note:** Windows clients using the UCM/ClearQuest integration are not vulnerable. \n\n 3. You use the Change Management Integrations for base ClearCase with ClearQuest or Rational Team Concert (RTC), or for UCM with ClearQuest or RTC on UNIX/Linux clients, configured to use SSL to communicate with a ClearQuest or RTC server. \n**Note:** Windows clients using the CMI integration are not vulnerable. \n\n 4. You use ratlperl, ccperl, or cqperl to run your own perl scripts, **and** those scripts use SSL connections.\n\n## Remediation/Fixes\n\nApply a fix pack for your appropriate release of ClearCase. These fix packs include OpenSSL 1.0.1h. \n \n\n\n**Affected Versions**\n\n| \n\n** Applying the fix** \n \n---|--- \n \n8.0.1.x\n\n| Install [Rational ClearCase Fix Pack 4 (8.0.1.4) for 8.0.1](<http://www.ibm.com/support/docview.wss?uid=swg24037660>) \n \n8.0.0.x\n\n| Install [Rational ClearCase Fix Pack 11 (8.0.0.11) for 8.0](<http://www.ibm.com/support/docview.wss?uid=swg24037659>) \n \n7.1.2.x\n\n| Install [Rational ClearCase Fix Pack 14 (7.1.2.14) for 7.1.2](<http://www.ibm.com/support/docview.wss?uid=swg24037658>) \n \n7.1.0.x \n7.1.1.x\n\n| Install [Rational ClearCase Fix Pack 14 (7.1.2.14) for 7.1.2](<http://www.ibm.com/support/docview.wss?uid=swg24037658>)\n\n * **Note:** 7.1.2.14 inter-operates with all 7.1.x.x systems, and can be installed in the same way as 7.1.x.x fix packs. \n \n## Workarounds and Mitigations\n\nDisable the ClearCase/ClearQuest integration and any customized defined use of ratlperl, ccperl, or cqperl with SSL until you apply the fixes listed above.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-07-10T08:34:12", "type": "ibm", "title": "Security Bulletin: Rational ClearCase is affected by OpenSSL vulnerabilities (CVE-2014-0224, CVE-2014-3470, CVE-2015-0292)", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470", "CVE-2015-0292"], "modified": "2018-07-10T08:34:12", "id": "1B259E9E5F2D041AC7FAB738E4AFC2E36A0D4261B89EFEF4EF6A7AEEFCF0C06C", "href": "https://www.ibm.com/support/pages/node/513009", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-23T21:53:05", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL.\n\n## Vulnerability Details\n\n## Abstract\n\nSecurity vulnerabilities have been discovered in OpenSSL.\n\n## Content\n\n**Vulnerability Details:**\n\n**CVE-ID:** [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>) \n \n**Description:** OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N)\n\nCVE ID: [CVE-2013-0169](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0169>) \n \n**Description: ** Allows Remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue. \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/81902> \nCVSS Environmental Score: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)\n\n**CVE-ID:** [CVE-2014-3470](<https://vulners.com/cve/CVE-2014-3470>) \n \n**Description:** OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH ciphersuites. A remote attacker could exploit this vulnerability to cause a denial of service. \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/93589> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n \n\n\n## Affected products and versions\n\nIBM Systems Director: 5.2.x.x, 6.1.x.x, 6.2.0.x, 6.2.1.x, 6.3.0.0, 6.3.1.0, 6.3.1.1, 6.3.2.0, 6.3.2.1, 6.3.2.2, 6.3.3.0, 6.3.3.1, 6.3.5.0 \n\n## Remediation:\n\nReleases 6.2.0.x, 6.2.1.x, 6.3.0.0, 6.3.1.0, 6.3.1.1, 6.3.2.0, 6.3.2.1, 6.3.2.2, 6.3.3.0, 6.3.3.1, 6.3.5.0 are supported and will be fixed. Releases 5.2.x.x, 6.1.x.x are unsupported and will not be fixed.\n\n 1. Click the following link: \n[ http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Director&product=ibm/Director/SystemsDirector&release=All&platform=All&function=all](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EDirector&product=ibm/Director/SystemsDirector&release=All&platform=All&function=all>) \n \n \n \n\n 2. Select the following fix pack: \n**SysDir6_2_x_0_6_3_x_0_****IT02562_IT02549_IT02551_IT02560**** \n \nNote:** This fix package includes all releases, and all platforms. \n \n\n 3. Follow the Instructions beneath the table for your desired platform\n\n \n\n\nProduct | VRMF | APAR | Associated Technote \n---|---|---|--- \nIBM Systems Director and IBM Systems Director Platform Agent | Xlinux Platform Agent 6.2.0.x to 6.3.5 | IT02562 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 709562501 \nIBM Systems Director and IBM Systems Director Platform Agent | Windows Platform Agent 6.2.0.x to 6.3.5 | IT02549 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 709506455 \nIBM Systems Director and IBM Systems Director Platform Agent | Power Linux Platform Agent 6.2.0.x to 6.3.5 | IT02551 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 709595132 \nIBM Systems Director and IBM Systems Director Platform Agent | Zlinux Platform Agent 6.2.0.x to 6.3.5 | IT02560 | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 709542145 \n \nIBM Systems Director and IBM Systems Director Platform Agent\n\n| AIX Platform Agent 6.2.0.x to 6.3.5 | Not Applicable see Technote | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 709526284 \nIBM Systems Director Platform Agent | IBMi Platform Agent 6.2.0.x to 6.3.5 | Not Applicable see Technote | <http://www.ibm.com/support/entry/portal/support/> and search for Technote 709526284 \n \n## Workaround(s) & Mitigation(s):\n\nNone known\n\n \n\n\n## References:\n\n * [Complete CVSS Guide](<http://www.first.org/cvss/cvss-guide.html>)\n * [On-line Calculator V2](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n\n**Related Information:** \n[IBM Secure Engineering Web Portal](<http://www-01.ibm.com/software/test/wenses/security/>) \n[IBM Product Security Incident Response Blog](<https://www.ibm.com/blogs/PSIRT>) \n\n\n**Acknowledgement** \nNone\n\n**Change History** \n26 June 2014: Original Copy Published\n\n* The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.\n\nNote: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2019-01-31T01:25:01", "type": "ibm", "title": "Security Bulletin: IBM Systems Director is affected by vulnerabilities in OpenSSL (CVE-2014-0224, CVE-2013-0169 and CVE-2014-3470)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-0169", "CVE-2014-0224", "CVE-2014-3470"], "modified": "2019-01-31T01:25:01", "id": "1643D6D42AA03B195E5B38E5C611550B5917ADFCFB91A4CEE3FA17D822F63866", "href": "https://www.ibm.com/support/pages/node/865104", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:52:23", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n**CVE-ID: **[](<https://vulners.com/cve/CVE-2014-0224>) \n[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93586_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n \n**CVE-ID: **[](<https://vulners.com/cve/CVE-2014-0198>) \n[_CVE-2014-0198_](<https://vulners.com/cve/CVE-2014-0198>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference in the do_ssl3_write() function. If SSL_MODE_RELEASE_BUFFERS is enabled, a remote attacker could exploit this vulnerability to cause the application to crash. \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93000_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93000>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) \n \n**CVE-ID: ** \n[_CVE-2010-5298_](<https://vulners.com/cve/CVE-2010-5298>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by a race condition in the ssl3_read_bytes function. If SSL_MODE_RELEASE_BUFFERS is enabled, an attacker could exploit this vulnerability using an SSL connection in a multithreaded environment to inject data into an SSL stream and cause a denial of service. \n \nCVSS Base Score: 4 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/92632_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/92632>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:H/Au:N/C:N/I:P/A:P) \n \n**CVE-ID: ** \n[_CVE-2014-3470_](<https://vulners.com/cve/CVE-2014-3470>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH ciphersuites. A remote attacker could exploit this vulnerability to cause a denial of service. \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93589_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93589>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n## Affected Products and Versions\n\n**Products: **IBM Security _Network Protection_** **(XGS**) **models 3100, 4100, 5100 \n \n**Firmware versions**: 5.1, 5.1.1, 5.1.2, 5.1.2.1, 5.2\n\n## Remediation/Fixes\n\nIBM has provided patches for all affected versions. Follow the installation instructions in the README files included with the patch. \n \n5.1.0.0-ISS-XGS-All-Models-Hotfix-FP0010 for IBM Security Network Protection products at version 5.1 \n[_http://www-933.ibm.com/support/fixcentral/swg/doSelectFixes?options.selectedFixes=5.1.0.0-ISS-XGS-All-Models-Hotfix-FP0010&continue=1_](<http://www-933.ibm.com/support/fixcentral/swg/doSelectFixes?options.selectedFixes=5.1.0.0-ISS-XGS-All-Models-Hotfix-FP0010&continue=1>) \n \n5.1.1.0-ISS-XGS-All-Models-Hotfix-FP0005 for IBM Security Network Protection products at version 5.1.1 \n[_http://www-933.ibm.com/support/fixcentral/swg/doSelectFixes?options.selectedFixes=5.1.1.0-ISS-XGS-All-Models-Hotfix-FP0005&continue=1_](<http://www-933.ibm.com/support/fixcentral/swg/doSelectFixes?options.selectedFixes=5.1.1.0-ISS-XGS-All-Models-Hotfix-FP0005&continue=1>) \n \n5.1.2.0-ISS-XGS-All-Models-Hotfix-FP0006 for IBM Security Network Protection products at version 5.1.2 \n[_http://www-933.ibm.com/support/fixcentral/swg/doSelectFixes?options.selectedFixes=5.1.2.0-ISS-XGS-All-Models-Hotfix-FP0006&continue=1_](<http://www-933.ibm.com/support/fixcentral/swg/doSelectFixes?options.selectedFixes=5.1.2.0-ISS-XGS-All-Models-Hotfix-FP0006&continue=1>) \n \n5.1.2.1-ISS-XGS-All-Models-Hotfix-FP0002 for IBM Security Network Protection products at version 5.1.2.1 \n[_http://www-933.ibm.com/support/fixcentral/swg/doSelectFixes?options.selectedFixes=5.1.2.1-ISS-XGS-All-Models-Hotfix-FP0002&continue=1_](<http://www-933.ibm.com/support/fixcentral/swg/doSelectFixes?options.selectedFixes=5.1.2.1-ISS-XGS-All-Models-Hotfix-FP0002&continue=1>) \n \n5.2.0.0-ISS-XGS-All-Models-Hotfix-FP0002 for IBM Security Network Protection products at version 5.2 \n[_http://www-933.ibm.com/support/fixcentral/swg/doSelectFixes?options.selectedFixes=5.2.0.0-ISS-XGS-All-Models-Hotfix-FP0002&continue=1_](<http://www-933.ibm.com/support/fixcentral/swg/doSelectFixes?options.selectedFixes=5.2.0.0-ISS-XGS-All-Models-Hotfix-FP0002&continue=1>)\n\n## Workarounds and Mitigations\n\nTurn off XGS outbound SSL Inspection\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-16T21:18:10", "type": "ibm", "title": "Security Bulletin: IBM Security Network Protection is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-5298", "CVE-2014-0198", "CVE-2014-0224", "CVE-2014-3470"], "modified": "2018-06-16T21:18:10", "id": "B88185A5DADFA0BD4649464297A9BEBB15A5F854779B6A57D714726749BDA2A6", "href": "https://www.ibm.com/support/pages/node/514055", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:38:38", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on 5 June 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93586_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n \n**CVE-ID: **[_CVE-2014-0198_](<https://vulners.com/cve/CVE-2014-0198>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference in the do_ssl3_write() function. If SSL_MODE_RELEASE_BUFFERS is enabled, a remote attacker could exploit this vulnerability to cause the application to crash. \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93000_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93000>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) \n \n**CVE-ID: **[_CVE-2010-5298_](<https://vulners.com/cve/CVE-2010-5298>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by a race condition in the ssl3_read_bytes function. If SSL_MODE_RELEASE_BUFFERS is enabled, an attacker could exploit this vulnerability using an SSL connection in a multithreaded environment to inject data into an SSL stream and cause a denial of service. \n \nCVSS Base Score: 4 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/92632_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/92632>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:H/Au:N/C:N/I:P/A:P) \n \n**CVE-ID: **[_CVE-2014-3470_](<https://vulners.com/cve/CVE-2014-3470>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH cipher suites. A remote attacker could exploit this vulnerability to cause a denial of service. \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/93589_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/93589>) for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n## Affected Products and Versions\n\nIBM Sterling Connect:Express for UNIX 1.4.6 \n\n * All versions prior to 1.4.6.1 iFix 146-108 \n\nIBM Sterling Connect:Express for UNIX 1.5.0.9 \n * All versions prior to 1.5.0.9 iFix 150-906 \n\nIBM Sterling Connect:Express for UNIX 1.5.0.11 \n * All versions prior to 1.5.0.11 iFix 150-1105\n\n## Remediation/Fixes\n\nThe recommended solution is to apply the fix as soon as practical. Please see below for information about the available fixes. \n \n\n\nVRMF| APAR| Remediation/First Fix \n---|---|--- \n1.4.6| TBD| Please contact your local[ IBM Remote Technical Support Center](<https://www-304.ibm.com/webapp/set2/sas/f/handbook/getsupport.html>) to request Connect:Express 1.4.6.1 iFix 146-108. \n1.5.0.9| TBD| Apply 1.5.0.9 iFix 150-906, available on [Fix Central](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?product=ibm/Other+software/IBM+Sterling+Connect%3AExpress+for+UNIX&release=All&platform=All&function=all>). \n1.5.0.11| TBD| Apply 1.5.0.11 iFix 150-1105, available on [Fix Central](<http://www-933.ibm.com/support/fixcentral/swg/selectFixes?product=ibm/Other+software/IBM+Sterling+Connect%3AExpress+for+UNIX&release=All&platform=All&function=all>). \n \n## Workarounds and Mitigations\n\nNone known\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2020-07-24T22:49:37", "type": "ibm", "title": "Security Bulletin: IBM Sterling Connect:Express for UNIX is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-5298", "CVE-2014-0198", "CVE-2014-0224", "CVE-2014-3470"], "modified": "2020-07-24T22:49:37", "id": "9CFE387228EDF2444E256198F05B5F01FFC949159C2A45DBC145447CA2120FC2", "href": "https://www.ibm.com/support/pages/node/515487", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:46:34", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n** **[](<https://vulners.com/cve/CVE-2014-0224>)CVE-ID: CVE-2014-0224 \n \nDESCRIPTION: OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n \n \nCVE-ID: CVE-2014-0198 \n \nDESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference in the do_ssl3_write() function. If SSL_MODE_RELEASE_BUFFERS is enabled, a remote attacker could exploit this vulnerability to cause the application to crash. \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93000> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) \n \n \nCVE-ID: CVE-2010-5298 \n \nDESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a race condition in the ssl3_read_bytes function. If SSL_MODE_RELEASE_BUFFERS is enabled, an attacker could exploit this vulnerability using an SSL connection in a multithreaded environment to inject data into an SSL stream and cause a denial of service. \n \nCVSS Base Score: 4 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/92632> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:H/Au:N/C:N/I:P/A:P) \n \n \nCVE-ID: CVE-2014-3470 \n \nDESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH ciphersuites. A remote attacker could exploit this vulnerability to cause a denial of service. \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93589> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n## Affected Products and Versions\n\nA subset of IBM Tivoli Storage FlashCopy Manager 4.1 components are affected by the OpenSSL vulnerabilities CVE- when used with a DS8000 or SVC or NetApp or IBM N-series storage device. The components are: \n \nUNIX and LINUX \n\n * version 4.1 and 3.2 FlashCopy Manager for DB2\n * version 4.1 and 3.2 FlashCopy Manager for Custom Applications\n * version 4.1 and 3.2 FlashCopy Manager for Oracle\n * version 4.1 and 3.2 FlashCopy Manager for Oracle (with SAP environments)\n \nVMware: \n\n * version 4.1 and 3.2 FlashCopy Manager for VMware\n \nThese FlashCopy Manager 4.1 and 3.2 components are vulnerable only when they initiate and maintain a communication session with a DS8000 or SVC or NetApp or IBM N series storage device. The vulnerability does not exist during communication sessions with other types of storage devices or when an external program attempts to initiate an OpenSSL session with FlashCopy Manager. \n\n**Note:** FlashCopy Manager 3.2 is only affected by CVE-2014-0224 and CVE-2014-3470.\n\nThe following are NOT affected and do NOT require an update:\n\n * FlashCopy Manager 4.1 Windows components\n * FlashCopy Manager 3.1\n * FlashCopy Manager 2.2\n * FlashCopy Manager 2.1\n\n## Remediation/Fixes\n\n_Product_\n\n| _First Fxing VRMF Level_| _Remediation/First Fix_ \n---|---|--- \nFlashCopy Manager 4.1 UNIX and Linux| 4.1.1.0| <http://www-01.ibm.com/support/docview.wss?uid=swg24038212> \nFlashCopy Manager 4.1 VMware| 4.1.1.0| <http://www-01.ibm.com/support/docview.wss?uid=swg24038212> \nFlashCopy Manager 3.2 UNIX and Linux| \n| Upgrade to FlashCopy Manager 4.1.1 \nFlashCopy Manager 3.2 VMware| \n| Upgrade to FlashCopy Manager 4.1.1 \n \n## Workarounds and Mitigations\n\nApply the already-available device fix to the DS8000 or SVC devices for the first CVE, and upgrade to the fixing FCM 4.1 level if using NetApp or N-Series devices.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-17T14:53:07", "type": "ibm", "title": "Security Bulletin: IBM Tivoli Storage FlashCopy Manager 4.1 and 3.2 UNIX and VMware is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0198, CVE-2010-5298, CVE-ID: CVE-2014-3470", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-5298", "CVE-2014-0198", "CVE-2014-0224", "CVE-2014-3470"], "modified": "2018-06-17T14:53:07", "id": "59D2B3A9444DD4B3349BA0CD02EC6FA19CD9998FBB947DCFF97EBA16C685E61F", "href": "https://www.ibm.com/support/pages/node/519131", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-02-21T05:46:40", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93586> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n \n**CVE-ID: **[_CVE-2014-0221_](<https://vulners.com/cve/CVE-2014-0221>) \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by a recursion error in the DTLS client. By sending an invalid DTLS handshake, a remote attacker could exploit this vulnerability to cause the application to crash. \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93587> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) \n \n \n \n**CVE-ID: **[_CVE-2014-0195_](<https://vulners.com/cve/CVE-2014-0195>) \n**DESCRIPTION: **OpenSSL is vulnerable to a buffer overflow. By sending invalid DTLS packet fragments, a remote attacker could exploit this vulnerability to overrun the client or server and execute arbitrary code on a DTLS client or server. \nCVSS Base Score: 7.5 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93588> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) \n \n**CVE-ID: **[_CVE-2014-3470_](<https://vulners.com/cve/CVE-2014-3470>) \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH ciphersuites. A remote attacker could exploit this vulnerability to cause a denial of service. \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93589> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) \n \nTWS uses OpenSSL only for secure communication between internal processes. \nFor Tivoli Workload Scheduler Distributed, TWS nodes are impacted by OpenSSL security exposure only if the TWS workstation has been defined with \u201csecuritylevel\u201d set to _on_ or _enabled_ or _force_. \nThe security exposures do not apply to the embedded WebSphere Application Server but only to programs installed under <TWS home>/bin. \n \nThe security vulnerability applies to os400 Dynamic Agents only, does not apply to Dynamic Agents or zCentric agents for all the other platforms. \n \nFor Tivoli Workload Scheduler for Applications, the programs that are installed in \n<TWS home>/methods are impacted if the agent that is hosting the methods has been defined with a \u201csecuritylevel\u201d set to _on_ or _enabled_ or _force_. \n \nTWS is a backoffice application that usually runs over a protected infrastructure where connections with outside networks is forbidden. Connection with branch offices where TWS agents run are always implemented through VPNs. For this reason SSL is not often used to interconnect TWS nodes. Customers with high security demands activate SSL, but they never let TWS nodes to communicate over unsecured networks. \nSaying that, the probability of having attacks is very limited, moreover the majority of the exposures belong to the \"denial of service\" category. This in the worst case, will lead to the temporary unavailability of the attacked TWS nodes. \n\n\n## Affected Products and Versions\n\n \n\uf0b7 Tivoli Workload Scheduler Distributed 8.4.0 FP07 and earlier \n\uf0b7 Tivoli Workload Scheduler Distributed 8.5.0 FP04 and earlier \n\uf0b7 Tivoli Workload Scheduler Distributed 8.5.1 FP05 and earlier \n\uf0b7 Tivoli Workload Scheduler Distributed 8.6.0 FP03 and earlier \n\uf0b7 Tivoli Workload Scheduler Distributed 9.1.0 FP01 and earlier \n\uf0b7 Tivoli Workload Scheduler Distributed 9.2.0 GA Level\n\n## Remediation/Fixes\n\nIBM has provided patches for all affected versions. \nAPAR IV61392 has been opened to address the following vulnerabilities for Tivoli Workload Scheduler: \nCVE-2014-0224 \nCVE-2014-0221 \nCVE-2014-0195 \nCVE-2014-3470 \n \nStarting from July 4th, the following interim fixes for IV61392 will be available for download on FixCentral \n \n\uf0b7 8.5.1-TIV-TWS-FP0005-IV61392 \nto be applied on top of Tivoli Workload Scheduler Distributed 8.5.1 FP05 \n\uf0b7 8.4.0-TIV-TWS-FP0007-IV61392 \nto be applied on top of Tivoli Workload Scheduler Distributed 8.4 FP07 \n\uf0b7 8.6.0- TIV-TWS-FP0007-IV61392 \nto be applied on top of Tivoli Workload Scheduler Distributed 8.6 FP03 \n\uf0b7 9.2.0-TIV-TWS-FP0000-IV61392 \nto be applied on top of Tivoli Workload Scheduler Distributed 9.2.0 \n\uf0b7 9.1.0- TIV-TWS-FP0001-IV61392 \nto be applied on top of Tivoli Workload Scheduler Distributed 9.1 FP01 \n \n \nand officially included in next fixpacks for the same Tivoli Workload Scheduler for Application versions. \nThe fix has already been included in Tivoli Workload Scheduler Distributed 8.5 FP05, that has been released by June 30th.\n\n## Workarounds and Mitigations\n\nNone.\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-17T14:44:05", "type": "ibm", "title": "Security Bulletin: Tivoli Workload Scheduler is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-3470", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0195", "CVE-2014-0221", "CVE-2014-0224", "CVE-2014-3470"], "modified": "2018-06-17T14:44:05", "id": "721FC01A91D46D1078768316C2F4DD020AE945A79244BA94E4330AC4B98D3EEC", "href": "https://www.ibm.com/support/pages/node/515965", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-21T05:46:42", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL 9.7d package that were reported on June 5, 2014 by the OpenSSL Project. \n\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See _<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>_ for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n \n**CVE-ID: **[_CVE-2014-0221_](<https://vulners.com/cve/CVE-2014-0221>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by a recursion error in the DTLS client. By sending an invalid DTLS handshake, a remote attacker could exploit this vulnerability to cause the application to crash. \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93587> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) \n \n**CVE-ID: **[_CVE-2014-0195_](<https://vulners.com/cve/CVE-2014-0195>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a buffer overflow. By sending invalid DTLS packet fragments, a remote attacker could exploit this vulnerability to overrun the client or server and execute arbitrary code on a DTLS client or server. \n \nCVSS Base Score: 7.5 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93588> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) \n \n**CVE-ID: **[_CVE-2014-3470_](<https://vulners.com/cve/CVE-2014-3470>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH ciphersuites. A remote attacker could exploit this vulnerability to cause a denial of service. \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See _<https://exchange.xforce.ibmcloud.com/vulnerabilities/93589>_ for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n## Affected Products and Versions\n\nTivoli Network Manager IP Edition V3.9 Fix Pack 4\n\n## Remediation/Fixes\n\n**IBM Tivoli Network Manager IP Edition 3.9 FP4**\n\n| **IV61480**| Please call IBM service and reference APAR IV61480, to obtain a fix for **Perl Collector OpenSSL fix**. A formal fix will also be provided as part of the 3.9 FP4 IF01. \n. \n---|---|--- \n \n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-17T14:42:56", "type": "ibm", "title": "Security Bulletin: IBM Tivoli Network Manager IP Edition V39 Fix Pack 4 HTTPS support for Perl Collector install is affected by the following OpenSSL vulnerabilities: (CVE-2014-0224, CVE-2014-0221, CVE-2014-0195 and CVE-2014-3470)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0195", "CVE-2014-0221", "CVE-2014-0224", "CVE-2014-3470"], "modified": "2018-06-17T14:42:56", "id": "BDFAD4707477BF19FBF5EE62279D8E1235AFA49C45AFED68460DDEB9848CD11E", "href": "https://www.ibm.com/support/pages/node/513533", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-21T05:46:42", "description": "## Summary\n\nSecurity vulnerabilities have been discovered in OpenSSL that were reported on June 5, 2014 by the OpenSSL Project.\n\n## Vulnerability Details\n\n**CVE-ID: **[_CVE-2014-0224_](<https://vulners.com/cve/CVE-2014-0224>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. \n \nCVSS Base Score: 5.8 \nCVSS Temporal Score: See _<https://exchange.xforce.ibmcloud.com/vulnerabilities/93586>_ for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N) \n \n**CVE-ID: **[_CVE-2014-0221_](<https://vulners.com/cve/CVE-2014-0221>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by a recursion error in the DTLS client. By sending an invalid DTLS handshake, a remote attacker could exploit this vulnerability to cause the application to crash. \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93587> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) \n \n \n \n**CVE-ID: **[_CVE-2014-0195_](<https://vulners.com/cve/CVE-2014-0195>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a buffer overflow. By sending invalid DTLS packet fragments, a remote attacker could exploit this vulnerability to overrun the client or server and execute arbitrary code on a DTLS client or server. \n \nCVSS Base Score: 7.5 \nCVSS Temporal Score: See _<https://exchange.xforce.ibmcloud.com/vulnerabilities/93588>_ for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) \n \n**CVE-ID: **[_CVE-2014-3470_](<https://vulners.com/cve/CVE-2014-3470>) \n \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by the implementation of anonymous ECDH ciphersuites. A remote attacker could exploit this vulnerability to cause a denial of service. \n \nCVSS Base Score: 4.3 \nCVSS Temporal Score: See _<https://exchange.xforce.ibmcloud.com/vulnerabilities/93589>_ for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n## Affected Products and Versions\n\nSSM 4.0.0 FP1 - FP14 and Interim Fix 14-02 \nSSM 4.0.1 FP1 and Interim Fix 01-01\n\n## Remediation/Fixes\n\nFor Version 4.0.0 \n\\- Apply SSM 4.0.0.14 Interim Fix 03: \n[_http://www.ibm.com/support/docview.wss?uid=isg400001838_](<http://www-01.ibm.com/support/docview.wss?rs=0&uid=isg400001838>) \nFor Version 4.0.1 \n\\- Apply SSM 4.0.1.1 Interim Fix 02: \n[ _http://www.ibm.com/support/docview.wss?uid=isg400001832_](<http://www.ibm.com/support/docview.wss?uid=isg400001832>)\n\n## Workarounds and Mitigations\n\nNone known\n\n## ", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2018-06-17T14:42:46", "type": "ibm", "title": "Security Bulletin: IBM Tivoli Netcool System Service Monitors/Application Service Monitors is affected by the following OpenSSL vulnerabilities: (CVE-2014-0224, CVE-2014-0221, CVE-2014-0195 and CVE-2014-3470)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0195", "CVE-2014-0221", "CVE-2014-0224", "CVE-2014-3470"], "modified": "2018-06-17T14:42:46", "id": "B4896777A2C3A3AA5A5F8226705C15B2981B2BC3A6350E425808F1AEC0777869", "href": "https://www.ibm.com/support/pages/node/513249", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "checkpoint_advisories": [{"lastseen": "2022-11-28T06:43:46", "description": "A security bypass via ChangeCipherSpec (CCS) Injection vulnerability has been reported in older versions of OpenSSL. The vulnerability is due to a weakness in OpenSSL methods used for keying material. The vulnerability can be exploited through the use of a man in the middle attack, where an attacker may be able to decrypt and modify traffic in transit. A remote unauthenticated attacker could exploit this vulnerability by using a specially crafted handshake to force the use of weak keying material.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2014-06-09T00:00:00", "type": "checkpoint_advisories", "title": "OpenSSL TLS Man-In-The-Middle Security Bypass (CVE-2014-0224)", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2018-01-11T00:00:00", "id": "CPAI-2014-1616", "href": "", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "openvas": [{"lastseen": "2019-10-02T15:18:01", "description": "Oracle Linux Local Security Checks ELSA-2014-0626", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-0626", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-10-02T00:00:00", "id": "OPENVAS:1361412562310123402", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123402", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123402\");\n script_version(\"2019-10-02T07:08:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:03:20 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"2019-10-02 07:08:50 +0000 (Wed, 02 Oct 2019)\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-0626\");\n script_tag(name:\"insight\", value:\"ELSA-2014-0626 - openssl097a and openssl098e security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-0626\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-0626.html\");\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"openssl097a\", rpm:\"openssl097a~0.9.7a~12.el5_10.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"openssl098e\", rpm:\"openssl098e~0.9.8e~18.0.1.el6_5.2\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-04-30T18:48:38", "description": "A potential security vulnerability has been identified with HP BladeSystem\n c-Class Onboard Administrator (OA) running OpenSSL. This vulnerability could be exploited\n remotely to allow the disclosure of information.", "cvss3": {}, "published": "2014-07-04T00:00:00", "type": "openvas", "title": "HP Onboard Administrator < 4.22 Information Disclosure Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2020-04-28T00:00:00", "id": "OPENVAS:1361412562310105056", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105056", "sourceData": "# Copyright (C) 2014 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from the referenced\n# advisories, and are Copyright (C) by the respective right holder(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nCPE = \"cpe:/a:hp:onboard_administrator\";\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105056\");\n script_version(\"2020-04-28T08:39:12+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-28 08:39:12 +0000 (Tue, 28 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-07-04 10:53:22 +0200 (Fri, 04 Jul 2014)\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n\n script_name(\"HP Onboard Administrator < 4.22 Information Disclosure Vulnerability\");\n\n script_xref(name:\"URL\", value:\"http://www.securityfocus.com/bid/67899\");\n script_xref(name:\"URL\", value:\"http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04351097-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken\");\n\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_family(\"Web application abuses\");\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_dependencies(\"gb_hp_onboard_administrator_detect.nasl\");\n script_mandatory_keys(\"hp/onboard_administrator/detected\");\n\n script_tag(name:\"impact\", value:\"Successfully exploiting this issue may allow attackers to obtain\n sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"solution\", value:\"Update to version 4.22 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"summary\", value:\"A potential security vulnerability has been identified with HP BladeSystem\n c-Class Onboard Administrator (OA) running OpenSSL. This vulnerability could be exploited\n remotely to allow the disclosure of information.\");\n\n script_tag(name:\"affected\", value:\"Onboard Administrator versions prior to 4.22.\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) )\n exit( 0 );\n\nif( ! vers = get_app_version( cpe:CPE, port:port ) )\n exit( 0 );\n\nif( version_is_less( version:vers, test_version:\"4.22\" ) ) {\n report = report_fixed_ver( installed_version:vers, fixed_version:\"4.22\" );\n security_message( port:port, data:report );\n exit( 0 );\n}\n\nexit( 99 );\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-12-06T16:43:05", "description": "There is an OpenSSL vulnerability that could allow an attacker to decrypt\nand modify traffic from a vulnerable client and server.", "cvss3": {}, "published": "2014-12-03T00:00:00", "type": "openvas", "title": "IBM Endpoint Manager 9.1 OpenSSL Man in the Middle Security Bypass Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-12-05T00:00:00", "id": "OPENVAS:1361412562310105129", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105129", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# IBM Endpoint Manager 9.1 OpenSSL Man in the Middle Security Bypass Vulnerability\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:ibm:tivoli_endpoint_manager\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105129\");\n script_bugtraq_id(67899);\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_version(\"2019-12-05T15:10:00+0000\");\n\n script_name(\"IBM Endpoint Manager 9.1 OpenSSL Man in the Middle Security Bypass Vulnerability\");\n\n script_xref(name:\"URL\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21677842\");\n\n script_tag(name:\"impact\", value:\"Successfully exploiting this issue may allow attackers to obtain\nsensitive information by conducting a man-in-the-middle attack. This may lead to other attacks.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"An OpenSSL advisory was announced on June 5, 2014 in several versions\nof OpenSSL. Several vulnerabilities were detailed in this advisory. One affects IBM Endpoint Manager 9.1 --\nthe ChangeCipherSpec (CCS) Injection Vulnerability. This vulnerability can be exploited by a Man-in-the-middle\n(MITM) attack allowing an attacker to eavesdrop and make falsifications between Root Server, Web Reports, Relay,\nand Proxy Agent communications. An eavesdropping attacker can obtain console login credentials.\");\n\n script_tag(name:\"solution\", value:\"Upgrade all components to version 9.1.1117.\");\n\n script_tag(name:\"summary\", value:\"There is an OpenSSL vulnerability that could allow an attacker to decrypt\nand modify traffic from a vulnerable client and server.\");\n\n script_tag(name:\"affected\", value:\"IBM Endpoint Manager 9.1 (9.1.1065, 9.1.1082, and 9.1.1088) are the only\naffected versions. Previous versions are not affected.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"last_modification\", value:\"2019-12-05 15:10:00 +0000 (Thu, 05 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2014-12-03 13:45:19 +0100 (Wed, 03 Dec 2014)\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_family(\"Web application abuses\");\n script_copyright(\"This script is Copyright (C) 2014 Greenbone Networks GmbH\");\n script_dependencies(\"gb_ibm_endpoint_manager_web_detect.nasl\");\n script_require_ports(\"Services/www\", 52311);\n script_mandatory_keys(\"ibm_endpoint_manager/installed\");\n\n exit(0);\n}\n\ninclude(\"http_func.inc\");\ninclude(\"host_details.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) ) exit( 0 );\nif( ! version = get_app_version( cpe:CPE, port:port ) ) exit( 0 );\n\nif( version !~ \"^9\\.1\\.[0-9]+\" ) exit( 0 );\n\nfixed_version = '9.1.1117';\n\ncv = split( version, sep:'.', keep:FALSE );\n\nck_version = cv[2];\n\nif( int( ck_version ) < int( 1117 ) )\n{\n report = 'Installed version: ' + version + '\\nFixed version: ' + fixed_version + '\\n';\n security_message( port:port, data:report );\n exit( 0 );\n}\n\nexit( 99 );", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-03-17T23:01:03", "description": "The remote host is missing an update announced via the referenced Security Advisory.", "cvss3": {}, "published": "2015-09-08T00:00:00", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2014-351)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2020-03-13T00:00:00", "id": "OPENVAS:1361412562310120310", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120310", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120310\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:23:18 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2014-351)\");\n script_tag(name:\"insight\", value:\"It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server. (CVE-2014-0224 )\");\n script_tag(name:\"solution\", value:\"Run yum update openssl097a to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2014-351.html\");\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"openssl097a\", rpm:\"openssl097a~0.9.7a~12.1.9.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"openssl097a-debuginfo\", rpm:\"openssl097a-debuginfo~0.9.7a~12.1.9.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-10-02T15:17:22", "description": "Junos OS is prone to a OpenSSL man in the middle security\nbypass vulnerability.", "cvss3": {}, "published": "2015-01-23T00:00:00", "type": "openvas", "title": "Junos SSL/TLS MITM Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-10-02T00:00:00", "id": "OPENVAS:1361412562310105946", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105946", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Junos SSL/TLS MITM Vulnerability\n#\n# Authors:\n# Christian Kuersteiner <christian.kuersteiner@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = 'cpe:/o:juniper:junos';\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105946\");\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_version(\"2019-10-02T07:08:50+0000\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_name(\"Junos SSL/TLS MITM Vulnerability\");\n\n script_xref(name:\"URL\", value:\"http://kb.juniper.net/JSA10629\");\n\n script_tag(name:\"summary\", value:\"Junos OS is prone to a OpenSSL man in the middle security\nbypass vulnerability.\");\n\n script_tag(name:\"impact\", value:\"An attacker may leverage a MITM attack and decrypt and modify\ntraffic from attacked client and server. The attack can only be performed between a vulnerable client\nand server.\");\n\n script_tag(name:\"insight\", value:\"An attacker using a carefully crafted handshake can force the\nuse of weak keying material in OpenSSL SSL/TLS clients and servers which can be exploited to perform\na man in the middle attack.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable OS build is present on the target host.\");\n script_tag(name:\"solution\", value:\"New builds of Junos OS software are available from Juniper.\");\n script_tag(name:\"affected\", value:\"Junos OS 11.4, 12.1, 12.2, 12.3, 13.1, 13.2 and 13.3\");\n\n script_tag(name:\"last_modification\", value:\"2019-10-02 07:08:50 +0000 (Wed, 02 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-01-23 10:23:01 +0700 (Fri, 23 Jan 2015)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"JunOS Local Security Checks\");\n script_copyright(\"This script is Copyright (C) 2015 Greenbone Networks GmbH\");\n script_dependencies(\"gb_ssh_junos_get_version.nasl\", \"gb_junos_snmp_version.nasl\");\n script_mandatory_keys(\"Junos/Version\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"revisions-lib.inc\");\n\nif (!version = get_app_version(cpe: CPE, nofork: TRUE))\n exit(0);\n\nif (revcomp(a:version, b:\"11.4R12-S1\") < 0) {\n security_message(port:0, data:version);\n exit(0);\n}\n\nif (version =~ \"^12\") {\n if (revcomp(a:version, b:\"12.1X44-D40\") < 0) {\n security_message(port:0, data:version);\n exit(0);\n }\n else if ((revcomp(a:version, b:\"12.1X46-D20\") < 0) &&\n (revcomp(a:version, b:\"12.1X46\") >= 0)) {\n security_message(port:0, data:version);\n exit(0);\n }\n else if ((revcomp(a:version, b:\"12.1X47-D15\") < 0) &&\n (revcomp(a:version, b:\"12.1X47\") >= 0)) {\n security_message(port:0, data:version);\n exit(0);\n }\n else if ((revcomp(a:version, b:\"12.2R9\") < 0) &&\n (revcomp(a:version, b:\"12.2\") >= 0)) {\n security_message(port:0, data:version);\n exit(0);\n }\n else if ((revcomp(a:version, b:\"12.3R8\") < 0) &&\n (revcomp(a:version, b:\"12.3\") >= 0)) {\n security_message(port:0, data:version);\n exit(0);\n }\n}\n\nif (version =~ \"^13\") {\n if (revcomp(a:version, b:\"13.1R4-S2\") < 0) {\n security_message(port:0, data:version);\n exit(0);\n }\n else if ((revcomp(a:version, b:\"13.2R5\") < 0) &&\n (revcomp(a:version, b:\"13.2\") >= 0)) {\n security_message(port:0, data:version);\n exit(0);\n }\n else if ((revcomp(a:version, b:\"13.3R2-S3\") < 0) &&\n (revcomp(a:version, b:\"13.3\") >= 0)) {\n security_message(port:0, data:version);\n exit(0);\n }\n}\n\nexit(99);\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-10-02T15:18:44", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-06-09T00:00:00", "type": "openvas", "title": "CentOS Update for openssl CESA-2014:0624 centos5", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-10-02T00:00:00", "id": "OPENVAS:1361412562310881943", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881943", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for openssl CESA-2014:0624 centos5\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.881943\");\n script_version(\"2019-10-02T07:08:50+0000\");\n script_tag(name:\"last_modification\", value:\"2019-10-02 07:08:50 +0000 (Wed, 02 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2014-06-09 12:27:31 +0530 (Mon, 09 Jun 2014)\");\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_name(\"CentOS Update for openssl CESA-2014:0624 centos5\");\n\n script_tag(name:\"affected\", value:\"openssl on CentOS 5\");\n script_tag(name:\"insight\", value:\"OpenSSL is a toolkit that implements the Secure Sockets Layer\n(SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. Please see the references for more information about this flaw.\n\nRed Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at the linked references.\n\n5. Bugs fixed:\n\n1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nopenssl-0.9.8e-27.el5_10.3.src.rpm\n\ni386:\nopenssl-0.9.8e-27.el5_10.3.i386.rpm\nopenssl-0.9.8e-27.el5_10.3.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.3.i386.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.3.i686.rpm\nopenssl-perl-0.9.8e-27.el5_10.3.i386.rpm\n\nx86_64:\nopenssl-0.9.8e-27.el5_10.3.i686.rpm\nopenssl-0.9.8e-27.el5_10.3.x86_64.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.3.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.3.x86_64.rpm\nopenssl-perl-0.9.8e-27.el5_10.3.x86_64.rpm\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nopenssl-0.9.8e-27.el5_10.3.src.rpm\n\ni386:\nopenssl-debuginfo-0.9.8e-27.el5_10.3.i386.rpm\nopenssl-devel-0.9.8e-27.el5_10.3.i386.rpm\n\nx86_64:\nopenssl-debuginfo-0.9.8e-27.el5_10.3.i386.rp ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"CESA\", value:\"2014:0624\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2014-June/020347.html\");\n script_xref(name:\"URL\", value:\"https://access.redhat.com/site/articles/11258\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openssl'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_xref(name:\"URL\", value:\"https://access.redhat.com/site/articles/904433\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"openssl\", rpm:\"openssl~0.9.8e~27.el5_10.3\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openssl-devel\", rpm:\"openssl-devel~0.9.8e~27.el5_10.3\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openssl-perl\", rpm:\"openssl-perl~0.9.8e~27.el5_10.3\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-10-02T15:18:58", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-06-09T00:00:00", "type": "openvas", "title": "RedHat Update for openssl RHSA-2014:0624-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-10-02T00:00:00", "id": "OPENVAS:1361412562310871174", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871174", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for openssl RHSA-2014:0624-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871174\");\n script_version(\"2019-10-02T07:08:50+0000\");\n script_tag(name:\"last_modification\", value:\"2019-10-02 07:08:50 +0000 (Wed, 02 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2014-06-09 16:06:14 +0530 (Mon, 09 Jun 2014)\");\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_name(\"RedHat Update for openssl RHSA-2014:0624-01\");\n\n\n script_tag(name:\"affected\", value:\"openssl on Red Hat Enterprise Linux (v. 5 server)\");\n script_tag(name:\"insight\", value:\"OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at the references.\n\n5. Bugs fixed:\n\n1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nopenssl-0.9.8e-27.el5_10.3.src.rpm\n\ni386:\nopenssl-0.9.8e-27.el5_10.3.i386.rpm\nopenssl-0.9.8e-27.el5_10.3.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.3.i386.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.3.i686.rpm\nopenssl-perl-0.9.8e-27.el5_10.3.i386.rpm\n\nx86_64:\nopenssl-0.9.8e-27.el5_10.3.i686.rpm\nopenssl-0.9.8e-27.el5_10.3.x86_64.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.3.i686.rpm\nopenssl-debuginfo-0.9.8e-27.el5_10.3.x86_64.rpm\nopenssl-perl-0.9.8e-27.el5_10.3.x86_64.rpm\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nopenssl-0.9.8e-27.el5_10.3.src.rpm\n\ni386:\nopenssl-debuginfo-0.9.8e-27.el5_10.3.i386.rpm\nopenssl-devel-0.9.8e-27.el5_10.3.i386.rpm\n\nx86_64:\nopenssl-debugi ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"RHSA\", value:\"2014:0624-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2014-June/msg00008.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openssl'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_5\");\n\n script_xref(name:\"URL\", value:\"https://access.redhat.com/site/articles/904433\");\n script_xref(name:\"URL\", value:\"https://access.redhat.com/site/articles/11258\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"openssl\", rpm:\"openssl~0.9.8e~27.el5_10.3\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openssl-debuginfo\", rpm:\"openssl-debuginfo~0.9.8e~27.el5_10.3\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openssl-devel\", rpm:\"openssl-devel~0.9.8e~27.el5_10.3\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openssl-perl\", rpm:\"openssl-perl~0.9.8e~27.el5_10.3\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-10-02T15:18:55", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-07-04T00:00:00", "type": "openvas", "title": "RedHat Update for openssl098e RHSA-2014:0680-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-10-02T00:00:00", "id": "OPENVAS:1361412562310871188", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871188", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for openssl098e RHSA-2014:0680-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871188\");\n script_version(\"2019-10-02T07:08:50+0000\");\n script_tag(name:\"last_modification\", value:\"2019-10-02 07:08:50 +0000 (Wed, 02 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2014-07-04 16:48:46 +0530 (Fri, 04 Jul 2014)\");\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_name(\"RedHat Update for openssl098e RHSA-2014:0680-01\");\n\n\n script_tag(name:\"affected\", value:\"openssl098e on Red Hat Enterprise Linux Server (v. 7)\");\n script_tag(name:\"insight\", value:\"OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available in the references.\n\n5. Bugs fixed:\n\n1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl098e-0.9.8e-29.el7_0.2.src.rpm\n\nx86_64:\nopenssl098e-0.9.8e-29.el7_0.2.i686.rpm\nopenssl098e-0.9.8e-29.el7_0.2.x86_64.rpm\nopenssl098e-debuginfo-0.9.8e-29.el7_0.2.i686.rpm\nopenssl098e-debuginfo-0.9.8e-29.el7_0.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl098e-0.9.8e-29.el7_0.2.src.rpm\n\nx86_64:\nopenssl098e-0.9.8e-29.el7_0.2.i686.rpm\nopenssl098e-0.9.8e-29.el7_0.2.x86_64.rpm\nopenssl098e-debuginfo-0.9.8e-29.el7_0.2.i686.rpm\nopenssl098e-debuginfo-0.9.8e-29.el7_0.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl098e-0.9.8e-29.el7_0.2.src.rpm\n\nppc64:\nopenssl098e-0.9.8e-29.el7_0.2.ppc.rpm\nopenssl098e-0.9.8e-29.el7_0.2.p ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"RHSA\", value:\"2014:0680-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2014-June/msg00021.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openssl098e'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_7\");\n\n script_xref(name:\"URL\", value:\"https://access.redhat.com/site/articles/904433\");\n script_xref(name:\"URL\", value:\"https://access.redhat.com/site/articles/11258\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_7\")\n{\n\n if ((res = isrpmvuln(pkg:\"openssl098e\", rpm:\"openssl098e~0.9.8e~29.el7_0.2\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openssl098e-debuginfo\", rpm:\"openssl098e-debuginfo~0.9.8e~29.el7_0.2\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-10-02T15:17:32", "description": "Oracle Linux Local Security Checks ELSA-2014-0680", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-0680", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-10-02T00:00:00", "id": "OPENVAS:1361412562310123368", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123368", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123368\");\n script_version(\"2019-10-02T07:08:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:02:52 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"2019-10-02 07:08:50 +0000 (Wed, 02 Oct 2019)\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-0680\");\n script_tag(name:\"insight\", value:\"ELSA-2014-0680 - openssl098e security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-0680\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-0680.html\");\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux7\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux7\")\n{\n if ((res = isrpmvuln(pkg:\"openssl098e\", rpm:\"openssl098e~0.9.8e~29.el7_0.2\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-10-02T15:18:27", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-06-09T00:00:00", "type": "openvas", "title": "CentOS Update for openssl097a CESA-2014:0626 centos5", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-10-02T00:00:00", "id": "OPENVAS:1361412562310881939", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881939", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for openssl097a CESA-2014:0626 centos5\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.881939\");\n script_version(\"2019-10-02T07:08:50+0000\");\n script_tag(name:\"last_modification\", value:\"2019-10-02 07:08:50 +0000 (Wed, 02 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2014-06-09 12:07:23 +0530 (Mon, 09 Jun 2014)\");\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_name(\"CentOS Update for openssl097a CESA-2014:0626 centos5\");\n\n script_tag(name:\"affected\", value:\"openssl097a on CentOS 5\");\n script_tag(name:\"insight\", value:\"OpenSSL is a toolkit that implements the Secure Sockets Layer\n(SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. Please see the references for more information about this flaw.\n\nRed Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at the\nlinked references.\n\n5. Bugs fixed:\n\n1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nopenssl097a-0.9.7a-12.el5_10.1.src.rpm\n\ni386:\nopenssl097a-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm\n\nx86_64:\nopenssl097a-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-0.9.7a-12.el5_10.1.x86_64.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nopenssl097a-0.9.7a-12.el5_10.1.src.rpm\n\ni386:\nopenssl097a-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm\n\nia64:\nopenssl097a-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-0.9.7a-12.el5_10.1.ia64.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.ia6 ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"CESA\", value:\"2014:0626\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2014-June/020346.html\");\n script_xref(name:\"URL\", value:\"https://access.redhat.com/site/articles/11258\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openssl097a'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_xref(name:\"URL\", value:\"https://access.redhat.com/site/articles/904433\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"openssl097a\", rpm:\"openssl097a~0.9.7a~12.el5_10.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-10-02T15:16:53", "description": "Oracle Linux Local Security Checks ELSA-2014-0624", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-0624", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-10-02T00:00:00", "id": "OPENVAS:1361412562310123401", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123401", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123401\");\n script_version(\"2019-10-02T07:08:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:03:19 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"2019-10-02 07:08:50 +0000 (Wed, 02 Oct 2019)\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-0624\");\n script_tag(name:\"insight\", value:\"ELSA-2014-0624 - openssl security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-0624\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-0624.html\");\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"openssl\", rpm:\"openssl~0.9.8e~27.el5_10.3\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"openssl-devel\", rpm:\"openssl-devel~0.9.8e~27.el5_10.3\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"openssl-perl\", rpm:\"openssl-perl~0.9.8e~27.el5_10.3\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-04-07T16:39:04", "description": "OpenSSL is prone to security-bypass vulnerability.\n\n This NVT has been merged into the NVT ", "cvss3": {}, "published": "2014-06-10T00:00:00", "type": "openvas", "title": "OpenSSL CCS Man in the Middle Security Bypass Vulnerability (STARTTLS Check)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2020-04-02T00:00:00", "id": "OPENVAS:1361412562310105043", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105043", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# OpenSSL CCS Man in the Middle Security Bypass Vulnerability (STARTTLS Check)\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105043\");\n script_version(\"2020-04-02T11:36:28+0000\");\n script_bugtraq_id(67899);\n script_cve_id(\"CVE-2014-0224\");\n script_name(\"OpenSSL CCS Man in the Middle Security Bypass Vulnerability (STARTTLS Check)\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-04-02 11:36:28 +0000 (Thu, 02 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-06-10 17:18:54 +0200 (Tue, 10 Jun 2014)\");\n script_category(ACT_ATTACK);\n script_family(\"General\");\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n\n script_xref(name:\"URL\", value:\"http://www.securityfocus.com/bid/67899\");\n\n script_tag(name:\"impact\", value:\"Successfully exploiting this issue may allow attackers to obtain\n sensitive information by conducting a man-in-the-middle attack. This\n may lead to other attacks.\");\n\n script_tag(name:\"vuldetect\", value:\"Send two SSL ChangeCipherSpec request and check the response.\");\n\n script_tag(name:\"insight\", value:\"OpenSSL does not properly restrict processing of ChangeCipherSpec\n messages, which allows man-in-the-middle attackers to trigger use of a\n zero-length master key in certain OpenSSL-to-OpenSSL communications, and\n consequently hijack sessions or obtain sensitive information, via a crafted\n TLS handshake, aka the 'CCS Injection' vulnerability.\");\n\n script_tag(name:\"solution\", value:\"Updates are available.\");\n\n script_tag(name:\"summary\", value:\"OpenSSL is prone to security-bypass vulnerability.\n\n This NVT has been merged into the NVT 'OpenSSL CCS Man in the Middle Security Bypass Vulnerability' (OID: 1.3.6.1.4.1.25623.1.0.105042).\");\n\n script_tag(name:\"affected\", value:\"OpenSSL before 0.9.8za,\n 1.0.0 before 1.0.0m and\n 1.0.1 before 1.0.1h\");\n\n script_tag(name:\"qod_type\", value:\"remote_analysis\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"deprecated\", value:TRUE);\n\n exit(0);\n}\n\nexit( 66 );\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-10-02T15:18:55", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-06-09T00:00:00", "type": "openvas", "title": "RedHat Update for openssl097a and openssl098e RHSA-2014:0626-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-10-02T00:00:00", "id": "OPENVAS:1361412562310871176", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871176", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for openssl097a and openssl098e RHSA-2014:0626-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871176\");\n script_version(\"2019-10-02T07:08:50+0000\");\n script_tag(name:\"last_modification\", value:\"2019-10-02 07:08:50 +0000 (Wed, 02 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2014-06-09 16:10:36 +0530 (Mon, 09 Jun 2014)\");\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_name(\"RedHat Update for openssl097a and openssl098e RHSA-2014:0626-01\");\n\n\n script_tag(name:\"affected\", value:\"openssl097a and openssl098e on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"insight\", value:\"OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at the references.\n\n5. Bugs fixed:\n\n1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nopenssl097a-0.9.7a-12.el5_10.1.src.rpm\n\ni386:\nopenssl097a-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm\n\nx86_64:\nopenssl097a-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-0.9.7a-12.el5_10.1.x86_64.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nopenssl097a-0.9.7a-12.el5_10.1.src.rpm\n\ni386:\nopenssl097a-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm\n\nia ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"RHSA\", value:\"2014:0626-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2014-June/msg00010.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openssl097a and openssl098e'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_(6|5)\");\n\n script_xref(name:\"URL\", value:\"https://access.redhat.com/site/articles/904433\");\n script_xref(name:\"URL\", value:\"https://access.redhat.com/site/articles/11258\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"openssl098e\", rpm:\"openssl098e~0.9.8e~18.el6_5.2\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openssl098e-debuginfo\", rpm:\"openssl098e-debuginfo~0.9.8e~18.el6_5.2\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"openssl097a\", rpm:\"openssl097a~0.9.7a~12.el5_10.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openssl097a-debuginfo\", rpm:\"openssl097a-debuginfo~0.9.7a~12.el5_10.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-03-17T23:01:04", "description": "The remote host is missing an update announced via the referenced Security Advisory.", "cvss3": {}, "published": "2015-09-08T00:00:00", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2014-350)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2020-03-13T00:00:00", "id": "OPENVAS:1361412562310120311", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120311", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120311\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:23:19 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2014-350)\");\n script_tag(name:\"insight\", value:\"It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server. (CVE-2014-0224 )\");\n script_tag(name:\"solution\", value:\"Run yum update openssl098e to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2014-350.html\");\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"openssl098e-debuginfo\", rpm:\"openssl098e-debuginfo~0.9.8e~18.2.13.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"openssl098e\", rpm:\"openssl098e~0.9.8e~18.2.13.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-10-02T15:18:43", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-06-09T00:00:00", "type": "openvas", "title": "CentOS Update for openssl098e CESA-2014:0626 centos6", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-10-02T00:00:00", "id": "OPENVAS:1361412562310881944", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881944", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for openssl098e CESA-2014:0626 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.881944\");\n script_version(\"2019-10-02T07:08:50+0000\");\n script_tag(name:\"last_modification\", value:\"2019-10-02 07:08:50 +0000 (Wed, 02 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2014-06-09 12:29:43 +0530 (Mon, 09 Jun 2014)\");\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_name(\"CentOS Update for openssl098e CESA-2014:0626 centos6\");\n\n script_tag(name:\"affected\", value:\"openssl098e on CentOS 6\");\n script_tag(name:\"insight\", value:\"OpenSSL is a toolkit that implements the Secure Sockets Layer\n(SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. Please see the references for more information about this flaw.\n\nRed Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at the\nlinked references.\n\n5. Bugs fixed:\n\n1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nopenssl097a-0.9.7a-12.el5_10.1.src.rpm\n\ni386:\nopenssl097a-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm\n\nx86_64:\nopenssl097a-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-0.9.7a-12.el5_10.1.x86_64.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nopenssl097a-0.9.7a-12.el5_10.1.src.rpm\n\ni386:\nopenssl097a-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm\n\nia64:\nopenssl097a-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-0.9.7a-12.el5_10.1.ia64.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm\nopenssl097a-debuginfo-0.9.7a-12.el5_10.1.ia6 ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"CESA\", value:\"2014:0626\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2014-June/020345.html\");\n script_xref(name:\"URL\", value:\"https://access.redhat.com/site/articles/11258\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openssl098e'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_xref(name:\"URL\", value:\"https://access.redhat.com/site/articles/904433\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"openssl098e\", rpm:\"openssl098e~0.9.8e~18.el6_5.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-04-02T18:47:27", "description": "OpenSSL is prone to security-bypass vulnerability.", "cvss3": {}, "published": "2014-06-10T00:00:00", "type": "openvas", "title": "SSL/TLS: OpenSSL CCS Man in the Middle Security Bypass Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2020-03-31T00:00:00", "id": "OPENVAS:1361412562310105042", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105042", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# SSL/TLS: OpenSSL CCS Man in the Middle Security Bypass Vulnerability\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105042\");\n script_version(\"2020-03-31T06:57:15+0000\");\n script_bugtraq_id(67899);\n script_cve_id(\"CVE-2014-0224\");\n script_name(\"SSL/TLS: OpenSSL CCS Man in the Middle Security Bypass Vulnerability\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-03-31 06:57:15 +0000 (Tue, 31 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-06-10 17:18:54 +0200 (Tue, 10 Jun 2014)\");\n script_category(ACT_ATTACK);\n script_family(\"SSL and TLS\");\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_dependencies(\"gb_tls_version_get.nasl\");\n script_mandatory_keys(\"ssl_tls/port\");\n\n script_xref(name:\"URL\", value:\"https://www.openssl.org/news/secadv/20140605.txt\");\n script_xref(name:\"URL\", value:\"http://www.securityfocus.com/bid/67899\");\n\n script_tag(name:\"impact\", value:\"Successfully exploiting this issue may allow attackers to obtain\n sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks.\");\n\n script_tag(name:\"vuldetect\", value:\"Send two SSL ChangeCipherSpec request and check the response.\");\n\n script_tag(name:\"insight\", value:\"OpenSSL does not properly restrict processing of ChangeCipherSpec\n messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in\n certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive\n information, via a crafted TLS handshake, aka the 'CCS Injection' vulnerability.\");\n\n script_tag(name:\"solution\", value:\"Updates are available. Please see the references for more information.\");\n\n script_tag(name:\"summary\", value:\"OpenSSL is prone to security-bypass vulnerability.\");\n\n script_tag(name:\"affected\", value:\"OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m and 1.0.1 before 1.0.1h.\");\n\n script_tag(name:\"qod_type\", value:\"remote_analysis\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"mysql.inc\"); # For recv_mysql_server_handshake() in open_ssl_socket()\ninclude(\"byte_func.inc\");\ninclude(\"ssl_funcs.inc\");\ninclude(\"misc_func.inc\");\n\nfunction _test( v, port ) {\n\n local_var v, port, soc, hello, data, record, hello_done, req;\n\n if( ! v ) return FALSE;\n\n soc = open_ssl_socket( port:port );\n if( ! soc ) return FALSE;\n\n hello = ssl_hello( version:v );\n if( ! hello ) {\n close( soc );\n return FALSE;\n }\n\n send( socket:soc, data:hello );\n\n while( ! hello_done ) {\n data = ssl_recv( socket:soc );\n if( ! data ) {\n close( soc );\n return FALSE;\n }\n\n record = search_ssl_record( data:data, search:make_array( \"content_typ\", SSLv3_ALERT ) );\n if( record ) {\n close( soc );\n return FALSE;\n }\n\n record = search_ssl_record( data:data, search:make_array( \"handshake_typ\", SSLv3_SERVER_HELLO_DONE ) );\n if( record ) {\n hello_done = TRUE;\n v = record[\"version\"];\n break;\n }\n }\n\n if( ! hello_done ) {\n close( soc );\n return FALSE;\n }\n\n req = raw_string( 0x14 ) + v + raw_string( 0x00, 0x01, 0x01 );\n send( socket:soc, data:req );\n\n data = ssl_recv( socket:soc );\n\n if( ! data && socket_get_error( soc ) == ECONNRESET ) {\n close( soc );\n return FALSE;\n }\n\n if( data ) {\n record = search_ssl_record( data:data, search:make_array( \"content_typ\", SSLv3_ALERT ) );\n if( record ) {\n close( soc );\n return FALSE;\n }\n }\n\n send( socket:soc, data:req );\n data = ssl_recv( socket:soc );\n\n close( soc );\n\n if( ! data ) return FALSE;\n\n record = search_ssl_record( data:data, search:make_array( \"content_typ\", SSLv3_ALERT ) );\n if( record ) {\n if( record['level'] == SSLv3_ALERT_FATAL && ( record['description'] == SSLv3_ALERT_BAD_RECORD_MAC || record['description'] == SSLv3_ALERT_DECRYPTION_FAILED ) ) {\n security_message( port:port );\n exit( 0 );\n }\n }\n}\n\nif( ! port = tls_ssl_get_port() )\n exit( 0 );\n\nif( ! versions = get_supported_tls_versions( port:port, min:SSL_v3, max:TLS_12 ) )\n exit( 0 );\n\nforeach version( versions ) {\n _test( v:version, port:port );\n}\n\nexit( 99 );\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-12-06T16:42:57", "description": "IBM Endpoint Manager is prone to a XML External Entity Injection", "cvss3": {}, "published": "2014-12-03T00:00:00", "type": "openvas", "title": "IBM Endpoint Manager XML External Entity Injection", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-12-05T00:00:00", "id": "OPENVAS:1361412562310105130", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105130", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# IBM Endpoint Manager XML External Entity Injection\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:ibm:tivoli_endpoint_manager\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105130\");\n script_cve_id(\"CVE-2014-0224\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_version(\"2019-12-05T15:10:00+0000\");\n\n script_name(\"IBM Endpoint Manager XML External Entity Injection\");\n\n script_xref(name:\"URL\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21673961\");\n script_xref(name:\"URL\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21673964\");\n script_xref(name:\"URL\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21673967\");\n\n script_tag(name:\"impact\", value:\"This vulnerability could allow an attacker to access files\n on an affected server or cause an affected server to make an arbitrary HTTP GET request.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"IBM Endpoint Manager could allow a remote attacker to obtain\n sensitive information, caused by an XML External Entity Injection (XXE) error when processing XML\n data. By sending specially-crafted XML data, an attacker could exploit this vulnerability to access\n files and obtain sensitive information on the server.\");\n\n script_tag(name:\"affected\", value:\"All 9.1 releases of the Console, Root Server, Web Reports and Server API\n earlier than 9.1.1088.0\n\n All 9.0 releases of the Console, Root Server, Web Reports and Server API earlier than 9.0.853.0\n\n All 8.2 releases of Web Reports and Server API earlier than 8.2.1445.0\");\n\n script_tag(name:\"summary\", value:\"IBM Endpoint Manager is prone to a XML External Entity Injection\");\n\n script_tag(name:\"solution\", value:\"Update to the latest version.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"last_modification\", value:\"2019-12-05 15:10:00 +0000 (Thu, 05 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2014-12-03 14:44:19 +0100 (Wed, 03 Dec 2014)\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_family(\"Web application abuses\");\n script_copyright(\"This script is Copyright (C) 2014 Greenbone Networks GmbH\");\n script_dependencies(\"gb_ibm_endpoint_manager_web_detect.nasl\");\n script_require_ports(\"Services/www\", 52311);\n script_mandatory_keys(\"ibm_endpoint_manager/installed\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) ) exit( 0 );\nif( ! version = get_app_version( cpe:CPE, port:port ) ) exit( 0 );\n\nif( version =~ \"^9\\.1\\.[0-9]+\" )\n{\n cv = split( version, sep:'.', keep:FALSE );\n ck_version = cv[2];\n\n if( int( ck_version ) < int( 1088 ) )\n {\n VULN = TRUE;\n fixed_version = '9.1.1088.0';\n }\n}\n\nelse if( version =~ \"^9\\.0\\.[0-9]+\" )\n{\n cv = split( version, sep:'.', keep:FALSE );\n ck_version = cv[2];\n\n if( int( ck_version ) < int( 853 ) )\n {\n VULN = TRUE;\n fixed_version = '9.0.853.0';\n }\n}\n\nelse if( version =~ \"^8\\.2\\.[0-9]+\" )\n{\n cv = split( version, sep:'.', keep:FALSE );\n ck_version = cv[2];\n\n if( int( ck_version ) < int( 1445 ) )\n {\n VULN = TRUE;\n fixed_version = '8.2.1445.0';\n }\n}\n\n\nif( VULN )\n{\n report = 'Installed version: ' + version + '\\nFixed version: ' + fixed_version + '\\n';\n security_message( port:port, data:report );\n exit( 0 );\n}\n\nexit( 99 );", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-01-31T18:38:17", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2015-10-13T00:00:00", "type": "openvas", "title": "SUSE: Security Advisory for OpenSSL (SUSE-SU-2014:0759-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470", "CVE-2014-0221"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310850751", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850751", "sourceData": "# Copyright (C) 2015 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850751\");\n script_version(\"2020-01-31T07:58:03+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 07:58:03 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-10-13 18:35:00 +0530 (Tue, 13 Oct 2015)\");\n script_cve_id(\"CVE-2014-0221\", \"CVE-2014-0224\", \"CVE-2014-3470\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"SUSE: Security Advisory for OpenSSL (SUSE-SU-2014:0759-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'OpenSSL'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"OpenSSL was updated to fix several vulnerabilities:\n\n * SSL/TLS MITM vulnerability. (CVE-2014-0224)\n\n * DTLS recursion flaw. (CVE-2014-0221)\n\n * Anonymous ECDH denial of service. (CVE-2014-3470)\");\n\n script_xref(name:\"URL\", value:\"http://www.openssl.org/news/secadv_20140605.txt\");\n\n script_tag(name:\"affected\", value:\"OpenSSL on SUSE Linux Enterprise Server 11 SP3\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"SUSE-SU\", value:\"2014:0759-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=SLES11\\.0SP3\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"SLES11.0SP3\") {\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8\", rpm:\"libopenssl0_9_8~0.9.8j~0.58.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8-hmac\", rpm:\"libopenssl0_9_8-hmac~0.9.8j~0.58.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"openssl\", rpm:\"openssl~0.9.8j~0.58.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"openssl-doc\", rpm:\"openssl-doc~0.9.8j~0.58.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8-32bit\", rpm:\"libopenssl0_9_8-32bit~0.9.8j~0.58.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8-hmac-32bit\", rpm:\"libopenssl0_9_8-hmac-32bit~0.9.8j~0.58.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8-x86\", rpm:\"libopenssl0_9_8-x86~0.9.8j~0.58.1\", rls:\"SLES11.0SP3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2017-07-24T12:50:55", "description": "The remote host is missing an update to openssl\nannounced via advisory DSA 2390-1.", "cvss3": {}, "published": "2012-02-11T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 2390-1 (openssl)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-4108", "CVE-2011-4576", "CVE-2011-4619", "CVE-2011-4354", "CVE-2011-4109"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:70708", "href": "http://plugins.openvas.org/nasl.php?oid=70708", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2390_1.nasl 6612 2017-07-07 12:08:03Z cfischer $\n# Description: Auto-generated from advisory DSA 2390-1 (openssl)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several vulnerabilities were discovered in OpenSSL, an implementation\nof TLS and related protocols. The Common Vulnerabilities and\nExposures project identifies the following vulnerabilities:\n\nCVE-2011-4108\nThe DTLS implementation performs a MAC check only if certain\npadding is valid, which makes it easier for remote attackers\nto recover plaintext via a padding oracle attack.\n\nCVE-2011-4109\nA double free vulnerability when X509_V_FLAG_POLICY_CHECK is\nenabled, allows remote attackers to cause applications crashes\nand potentially allow execution of arbitrary code by\ntriggering failure of a policy check.\n\nCVE-2011-4354\nOn 32-bit systems, the operations on NIST elliptic curves\nP-256 and P-384 are not correctly implemented, potentially\nleaking the private ECC key of a TLS server. (Regular\nRSA-based keys are not affected by this vulnerability.)\n\nCVE-2011-4576\nThe SSL 3.0 implementation does not properly initialize data\nstructures for block cipher padding, which might allow remote\nattackers to obtain sensitive information by decrypting the\npadding data sent by an SSL peer.\n\nCVE-2011-4619\nThe Server Gated Cryptography (SGC) implementation in OpenSSL\ndoes not properly handle handshake restarts, unnecessarily\nsimplifying CPU exhaustion attacks.\n\nFor the oldstable distribution (lenny), these problems have been fixed\nin version 0.9.8g-15+lenny15.\n\nFor the stable distribution (squeeze), these problems have been fixed\nin version 0.9.8o-4squeeze5.\n\nFor the testing distribution (wheezy) and the unstable distribution\n(sid), these problems have been fixed in version 1.0.0f-1.\n\nWe recommend that you upgrade your openssl packages.\";\ntag_summary = \"The remote host is missing an update to openssl\nannounced via advisory DSA 2390-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202390-1\";\n\nif(description)\n{\n script_id(70708);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2011-4108\", \"CVE-2011-4109\", \"CVE-2011-4354\", \"CVE-2011-4576\", \"CVE-2011-4619\");\n script_version(\"$Revision: 6612 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:08:03 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-11 03:28:14 -0500 (Sat, 11 Feb 2012)\");\n script_name(\"Debian Security Advisory DSA 2390-1 (openssl)\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libcrypto0.9.8-udeb\", ver:\"0.9.8g-15+lenny13\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl-dev\", ver:\"0.9.8g-15+lenny15\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl0.9.8\", ver:\"0.9.8g-15+lenny15\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl0.9.8-dbg\", ver:\"0.9.8g-15+lenny15\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"openssl\", ver:\"0.9.8g-15+lenny15\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libcrypto0.9.8-udeb\", ver:\"0.9.8o-4squeeze5\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl-dev\", ver:\"0.9.8o-4squeeze5\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl0.9.8\", ver:\"0.9.8o-4squeeze5\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl0.9.8-dbg\", ver:\"0.9.8o-4squeeze5\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"openssl\", ver:\"0.9.8o-4squeeze5\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libcrypto1.0.0-udeb\", ver:\"1.0.0g-1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl-dev\", ver:\"1.0.0g-1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl-doc\", ver:\"1.0.0g-1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl1.0.0\", ver:\"1.0.0g-1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl1.0.0-dbg\", ver:\"1.0.0g-1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"openssl\", ver:\"1.0.0g-1\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:15", "description": "The remote host is missing an update to openssl\nannounced via advisory DSA 2390-1.", "cvss3": {}, "published": "2012-02-11T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 2390-1 (openssl)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-4108", "CVE-2011-4576", "CVE-2011-4619", "CVE-2011-4354", "CVE-2011-4109"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:136141256231070708", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231070708", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2390_1.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Description: Auto-generated from advisory DSA 2390-1 (openssl)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.70708\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2011-4108\", \"CVE-2011-4109\", \"CVE-2011-4354\", \"CVE-2011-4576\", \"CVE-2011-4619\");\n script_version(\"$Revision: 14275 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-11 03:28:14 -0500 (Sat, 11 Feb 2012)\");\n script_name(\"Debian Security Advisory DSA 2390-1 (openssl)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(5|6|7)\");\n script_xref(name:\"URL\", value:\"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202390-1\");\n script_tag(name:\"insight\", value:\"Several vulnerabilities were discovered in OpenSSL, an implementation\nof TLS and related protocols. The Common Vulnerabilities and\nExposures project identifies the following vulnerabilities:\n\nCVE-2011-4108\nThe DTLS implementation performs a MAC check only if certain\npadding is valid, which makes it easier for remote attackers\nto recover plaintext via a padding oracle attack.\n\nCVE-2011-4109\nA double free vulnerability when X509_V_FLAG_POLICY_CHECK is\nenabled, allows remote attackers to cause applications crashes\nand potentially allow execution of arbitrary code by\ntriggering failure of a policy check.\n\nCVE-2011-4354\nOn 32-bit systems, the operations on NIST elliptic curves\nP-256 and P-384 are not correctly implemented, potentially\nleaking the private ECC key of a TLS server. (Regular\nRSA-based keys are not affected by this vulnerability.)\n\nCVE-2011-4576\nThe SSL 3.0 implementation does not properly initialize data\nstructures for block cipher padding, which might allow remote\nattackers to obtain sensitive information by decrypting the\npadding data sent by an SSL peer.\n\nCVE-2011-4619\nThe Server Gated Cryptography (SGC) implementation in OpenSSL\ndoes not properly handle handshake restarts, unnecessarily\nsimplifying CPU exhaustion attacks.\n\nFor the oldstable distribution (lenny), these problems have been fixed\nin version 0.9.8g-15+lenny15.\n\nFor the stable distribution (squeeze), these problems have been fixed\nin version 0.9.8o-4squeeze5.\n\nFor the testing distribution (wheezy) and the unstable distribution\n(sid), these problems have been fixed in version 1.0.0f-1.\");\n\n script_tag(name:\"solution\", value:\"We recommend that you upgrade your openssl packages.\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update to openssl\nannounced via advisory DSA 2390-1.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libcrypto0.9.8-udeb\", ver:\"0.9.8g-15+lenny13\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl-dev\", ver:\"0.9.8g-15+lenny15\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl0.9.8\", ver:\"0.9.8g-15+lenny15\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl0.9.8-dbg\", ver:\"0.9.8g-15+lenny15\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"openssl\", ver:\"0.9.8g-15+lenny15\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libcrypto0.9.8-udeb\", ver:\"0.9.8o-4squeeze5\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl-dev\", ver:\"0.9.8o-4squeeze5\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl0.9.8\", ver:\"0.9.8o-4squeeze5\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl0.9.8-dbg\", ver:\"0.9.8o-4squeeze5\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"openssl\", ver:\"0.9.8o-4squeeze5\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libcrypto1.0.0-udeb\", ver:\"1.0.0g-1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl-dev\", ver:\"1.0.0g-1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl-doc\", ver:\"1.0.0g-1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl1.0.0\", ver:\"1.0.0g-1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libssl1.0.0-dbg\", ver:\"1.0.0g-1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"openssl\", ver:\"1.0.0g-1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:34", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-06-17T00:00:00", "type": "openvas", "title": "Ubuntu Update for openssl USN-2232-2", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470", "CVE-2014-0195", "CVE-2014-0221"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310841854", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841854", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2232_2.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for openssl USN-2232-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841854\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-06-17 10:05:28 +0530 (Tue, 17 Jun 2014)\");\n script_cve_id(\"CVE-2014-0224\", \"CVE-2014-0195\", \"CVE-2014-0221\", \"CVE-2014-3470\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Ubuntu Update for openssl USN-2232-2\");\n\n script_tag(name:\"affected\", value:\"openssl on Ubuntu 14.04 LTS,\n Ubuntu 13.10,\n Ubuntu 12.04 LTS\");\n script_tag(name:\"insight\", value:\"USN-2232-1 fixed vulnerabilities in OpenSSL. The upstream fix\nfor CVE-2014-0224 caused a regression for certain applications that use\ntls_session_secret_cb, such as wpa_supplicant. This update fixes the\nproblem.\n\nOriginal advisory details:\n\nJü ri Aedla discovered that OpenSSL incorrectly handled invalid DTLS\nfragments. A remote attacker could use this issue to cause OpenSSL to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and\nUbuntu 14.04 LTS. (CVE-2014-0195)\nImre Rad discovered that OpenSSL incorrectly handled DTLS recursions. A\nremote attacker could use this issue to cause OpenSSL to crash, resulting\nin a denial of service. (CVE-2014-0221)\nKIKUCHI Masashi discovered that OpenSSL incorrectly handled certain\nhandshakes. A remote attacker could use this flaw to perform a\nman-in-the-middle attack and possibly decrypt and modify traffic.\n(CVE-2014-0224)\nFelix Grö bert and Ivan Fratrić discovered that OpenSSL incorrectly\nhandled anonymous ECDH ciphersuites. A remote attacker could use this issue to\ncause OpenSSL to crash, resulting in a denial of service. This issue only\naffected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS.\n(CVE-2014-3470)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2232-2\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2232-2/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openssl'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|12\\.04 LTS|13\\.10)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libssl1.0.0:i386\", ver:\"1.0.1f-1ubuntu2.3\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libssl1.0.0\", ver:\"1.0.1-4ubuntu5.15\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libssl1.0.0:i386\", ver:\"1.0.1e-3ubuntu1.5\", rls:\"UBUNTU13.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T18:39:02", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-06-09T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for update (openSUSE-SU-2014:0765-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470", "CVE-2014-0195", "CVE-2014-0221"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310850590", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850590", "sourceData": "# Copyright (C) 2014 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850590\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-06-09 13:53:36 +0530 (Mon, 09 Jun 2014)\");\n script_cve_id(\"CVE-2014-0195\", \"CVE-2014-0221\", \"CVE-2014-0224\", \"CVE-2014-3470\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"openSUSE: Security Advisory for update (openSUSE-SU-2014:0765-1)\");\n\n script_tag(name:\"affected\", value:\"update on openSUSE 11.4\");\n\n script_tag(name:\"insight\", value:\"The openssl library was updated to version 1.0.0m fixing various security\n issues and bugs:\n\n Security issues fixed:\n\n - CVE-2014-0224: Fix for SSL/TLS MITM flaw. An attacker using a carefully\n crafted handshake can force the use of weak keying material in OpenSSL\n SSL/TLS clients and servers.\n\n - CVE-2014-0221: Fix DTLS recursion flaw. By sending an invalid DTLS\n handshake to an OpenSSL DTLS client the code can be made to recurse\n eventually crashing in a DoS attack.\n\n - CVE-2014-0195: Fix DTLS invalid fragment vulnerability. A buffer\n overrun attack can be triggered by sending invalid DTLS fragments to an\n OpenSSL DTLS client or server. This is potentially exploitable to run\n arbitrary code on a vulnerable client or server.\n\n - CVE-2014-3470: Fix bug in TLS code where clients enable anonymous ECDH\n ciphersuites are subject to a denial of service attack.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"openSUSE-SU\", value:\"2014:0765-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'update'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE11\\.4\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSE11.4\") {\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl-devel\", rpm:\"libopenssl-devel~1.0.0m~18.53.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl1_0_0\", rpm:\"libopenssl1_0_0~1.0.0m~18.53.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl1_0_0-debuginfo\", rpm:\"libopenssl1_0_0-debuginfo~1.0.0m~18.53.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"openssl\", rpm:\"openssl~1.0.0m~18.53.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"openssl-debuginfo\", rpm:\"openssl-debuginfo~1.0.0m~18.53.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"openssl-debugsource\", rpm:\"openssl-debugsource~1.0.0m~18.53.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl1_0_0-32bit\", rpm:\"libopenssl1_0_0-32bit~1.0.0m~18.53.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl1_0_0-debuginfo-32bit\", rpm:\"libopenssl1_0_0-debuginfo-32bit~1.0.0m~18.53.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"openssl-doc\", rpm:\"openssl-doc~1.0.0m~18.53.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl1_0_0-debuginfo-x86\", rpm:\"libopenssl1_0_0-debuginfo-x86~1.0.0m~18.53.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl1_0_0-x86\", rpm:\"libopenssl1_0_0-x86~1.0.0m~18.53.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-12-19T16:06:24", "description": "VMware product updates address OpenSSL security vulnerabilities.", "cvss3": {}, "published": "2014-06-13T00:00:00", "type": "openvas", "title": "VMware ESXi updates address OpenSSL security vulnerabilities (VMSA-2014-0006)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470", "CVE-2010-5298", "CVE-2014-0198"], "modified": "2019-12-18T00:00:00", "id": "OPENVAS:1361412562310105044", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105044", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# VMSA-2014-0006: VMware product updates address OpenSSL security vulnerabilities.\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105044\");\n script_cve_id(\"CVE-2014-0224\", \"CVE-2014-0198\", \"CVE-2010-5298\", \"CVE-2014-3470\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_version(\"2019-12-18T11:13:08+0000\");\n script_name(\"VMware ESXi updates address OpenSSL security vulnerabilities (VMSA-2014-0006)\");\n\n script_xref(name:\"URL\", value:\"http://www.vmware.com/security/advisories/VMSA-2014-0006.html\");\n\n script_tag(name:\"last_modification\", value:\"2019-12-18 11:13:08 +0000 (Wed, 18 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2014-06-13 11:04:01 +0100 (Fri, 13 Jun 2014)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"VMware Local Security Checks\");\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_dependencies(\"gb_vmware_esxi_init.nasl\");\n script_mandatory_keys(\"VMware/ESXi/LSC\", \"VMware/ESX/version\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if the target host is missing one or more patch(es).\");\n\n script_tag(name:\"insight\", value:\"a. OpenSSL update for multiple products.\n\n OpenSSL libraries have been updated in multiple products to versions 0.9.8za and 1.0.1h\n in order to resolve multiple security issues.\");\n\n script_tag(name:\"solution\", value:\"Apply the missing patch(es).\");\n\n script_tag(name:\"summary\", value:\"VMware product updates address OpenSSL security vulnerabilities.\");\n\n script_tag(name:\"affected\", value:\"ESXi 5.5 prior to ESXi550-201406401-SG\n\n ESXi 5.1 without patch ESXi510-201406401-SG\n\n ESXi 5.0 without patch ESXi500-201407401-SG\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"vmware_esx.inc\");\ninclude(\"version_func.inc\");\n\nif(!get_kb_item(\"VMware/ESXi/LSC\"))\n exit(0);\n\nif(!esxVersion = get_kb_item(\"VMware/ESX/version\"))\n exit(0);\n\npatches = make_array(\"5.5.0\", \"VIB:esx-base:5.5.0-1.18.1881737\",\n \"5.1.0\", \"VIB:esx-base:5.1.0-2.29.1900470\",\n \"5.0.0\", \"VIB:esx-base:5.0.0-3.50.1918656\");\n\nif(!patches[esxVersion])\n exit(99);\n\nif(report = esxi_patch_missing(esxi_version:esxVersion, patch:patches[esxVersion])) {\n security_message(port:0, data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-05-29T18:37:09", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-06-09T00:00:00", "type": "openvas", "title": "Ubuntu Update for openssl USN-2232-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470", "CVE-2014-0195", "CVE-2014-0221"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310841843", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841843", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2232_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for openssl USN-2232-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841843\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-06-09 14:20:03 +0530 (Mon, 09 Jun 2014)\");\n script_cve_id(\"CVE-2014-0195\", \"CVE-2014-0221\", \"CVE-2014-0224\", \"CVE-2014-3470\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Ubuntu Update for openssl USN-2232-1\");\n\n script_tag(name:\"affected\", value:\"openssl on Ubuntu 14.04 LTS,\n Ubuntu 13.10,\n Ubuntu 12.04 LTS,\n Ubuntu 10.04 LTS\");\n script_tag(name:\"insight\", value:\"Jü ri Aedla discovered that OpenSSL incorrectly handled\ninvalid DTLS fragments. A remote attacker could use this issue to cause OpenSSL\nto crash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and\nUbuntu 14.04 LTS. (CVE-2014-0195)\n\nImre Rad discovered that OpenSSL incorrectly handled DTLS recursions. A\nremote attacker could use this issue to cause OpenSSL to crash, resulting\nin a denial of service. (CVE-2014-0221)\n\nKIKUCHI Masashi discovered that OpenSSL incorrectly handled certain\nhandshakes. A remote attacker could use this flaw to perform a\nman-in-the-middle attack and possibly decrypt and modify traffic.\n(CVE-2014-0224)\n\nFelix Grö bert and Ivan Fratrić discovered that OpenSSL incorrectly handled\nanonymous ECDH ciphersuites. A remote attacker could use this issue to\ncause OpenSSL to crash, resulting in a denial of service. This issue only\naffected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS.\n(CVE-2014-3470)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2232-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2232-1/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openssl'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|12\\.04 LTS|10\\.04 LTS|13\\.10)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libssl1.0.0:i386\", ver:\"1.0.1f-1ubuntu2.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libssl1.0.0\", ver:\"1.0.1-4ubuntu5.14\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libssl0.9.8\", ver:\"0.9.8k-7ubuntu8.18\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libssl1.0.0:i386\", ver:\"1.0.1e-3ubuntu1.4\", rls:\"UBUNTU13.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-10-02T15:18:32", "description": "VMware product updates address OpenSSL security vulnerabilities.", "cvss3": {}, "published": "2014-07-04T00:00:00", "type": "openvas", "title": "VMware Security Updates for vCenter Server (VMSA-2014-0006)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470", "CVE-2010-5298", "CVE-2014-0198"], "modified": "2019-10-02T00:00:00", "id": "OPENVAS:1361412562310105057", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105057", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# VMware Security Updates for vCenter Server (VMSA-2014-0006)\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105057\");\n script_cve_id(\"CVE-2014-0224\", \"CVE-2014-0198\", \"CVE-2010-5298\", \"CVE-2014-3470\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_version(\"2019-10-02T07:08:50+0000\");\n script_name(\"VMware Security Updates for vCenter Server (VMSA-2014-0006)\");\n\n\n script_xref(name:\"URL\", value:\"http://www.vmware.com/security/advisories/VMSA-2014-0006.html\");\n\n script_tag(name:\"last_modification\", value:\"2019-10-02 07:08:50 +0000 (Wed, 02 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2014-07-04 11:04:01 +0100 (Fri, 04 Jul 2014)\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_family(\"General\");\n script_copyright(\"This script is Copyright (C) 2014 Greenbone Networks GmbH\");\n script_dependencies(\"gb_vmware_vcenter_detect.nasl\");\n script_mandatory_keys(\"VMware_vCenter/version\", \"VMware_vCenter/build\");\n\n script_tag(name:\"vuldetect\", value:\"Check the build number\");\n script_tag(name:\"insight\", value:\"a. OpenSSL update for multiple products.\n\nOpenSSL libraries have been updated in multiple products to versions 0.9.8za and 1.0.1h\nin order to resolve multiple security issues.\");\n script_tag(name:\"solution\", value:\"Apply the missing patch(es).\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"VMware product updates address OpenSSL security vulnerabilities.\");\n script_tag(name:\"affected\", value:\"vCenter prior to 5.5u1b\nvCenter prior to 5.1U2a\nvCenter prior to 5.0U3a\");\n\n exit(0);\n\n}\n\ninclude(\"vmware_esx.inc\");\n\nif ( ! vcenter_version = get_kb_item(\"VMware_vCenter/version\") ) exit( 0 );\nif ( ! vcenter_build = get_kb_item(\"VMware_vCenter/build\") ) exit( 0 );\n\nfixed_builds = make_array( \"5.5.0\",\"1891310\",\n \"5.1.0\",\"1917403\",\n \"5.0.0\",\"1923446\" );\n\nif ( ! fixed_builds[ vcenter_version] ) exit( 0 );\n\nif ( int( vcenter_build ) < int( fixed_builds[ vcenter_version ] ) )\n{\n security_message( port:0, data: esxi_remote_report( ver:vcenter_version, build: vcenter_build, fixed_build: fixed_builds[vcenter_version], typ:'vCenter' ) );\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-05-29T18:37:11", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-08-19T00:00:00", "type": "openvas", "title": "Ubuntu Update for openssl USN-2232-4", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470", "CVE-2014-0195", "CVE-2014-0221"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310841933", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841933", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2232_4.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for openssl USN-2232-4\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841933\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-08-19 05:58:49 +0200 (Tue, 19 Aug 2014)\");\n script_cve_id(\"CVE-2014-0195\", \"CVE-2014-0221\", \"CVE-2014-0224\", \"CVE-2014-3470\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Ubuntu Update for openssl USN-2232-4\");\n\n script_tag(name:\"affected\", value:\"openssl on Ubuntu 10.04 LTS\");\n script_tag(name:\"insight\", value:\"USN-2232-1 fixed vulnerabilities in OpenSSL. One of the patch\nbackports for Ubuntu 10.04 LTS caused a regression for certain applications.\nThis update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nJü ri Aedla discovered that OpenSSL incorrectly handled invalid DTLS\nfragments. A remote attacker could use this issue to cause OpenSSL to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and\nUbuntu 14.04 LTS. (CVE-2014-0195)\nImre Rad discovered that OpenSSL incorrectly handled DTLS recursions. A\nremote attacker could use this issue to cause OpenSSL to crash, resulting\nin a denial of service. (CVE-2014-0221)\nKIKUCHI Masashi discovered that OpenSSL incorrectly handled certain\nhandshakes. A remote attacker could use this flaw to perform a\nman-in-the-middle attack and possibly decrypt and modify traffic.\n(CVE-2014-0224)\nFelix Grö bert and Ivan Fratrić discovered that OpenSSL incorrectly\nhandled anonymous ECDH ciphersuites. A remote attacker could use this issue to\ncause OpenSSL to crash, resulting in a denial of service. This issue only\naffected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS.\n(CVE-2014-3470)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2232-4\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2232-4/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openssl'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU10\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libssl0.9.8\", ver:\"0.9.8k-7ubuntu8.21\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:09", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2014-07-01T00:00:00", "type": "openvas", "title": "Ubuntu Update for openssl USN-2232-3", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470", "CVE-2014-0195", "CVE-2014-0221"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310841867", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841867", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2232_3.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for openssl USN-2232-3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841867\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-07-01 21:24:39 +0530 (Tue, 01 Jul 2014)\");\n script_cve_id(\"CVE-2014-0224\", \"CVE-2014-0195\", \"CVE-2014-0221\", \"CVE-2014-3470\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Ubuntu Update for openssl USN-2232-3\");\n\n script_tag(name:\"affected\", value:\"openssl on Ubuntu 14.04 LTS,\n Ubuntu 13.10,\n Ubuntu 12.04 LTS,\n Ubuntu 10.04 LTS\");\n script_tag(name:\"insight\", value:\"USN-2232-1 fixed vulnerabilities in OpenSSL. The upstream fix\nfor CVE-2014-0224 caused a regression for certain applications that use\nrenegotiation, such as PostgreSQL. This update fixes the problem.\n\nOriginal advisory details:\n\nJü ri Aedla discovered that OpenSSL incorrectly handled invalid DTLS\nfragments. A remote attacker could use this issue to cause OpenSSL to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and\nUbuntu 14.04 LTS. (CVE-2014-0195)\nImre Rad discovered that OpenSSL incorrectly handled DTLS recursions. A\nremote attacker could use this issue to cause OpenSSL to crash, resulting\nin a denial of service. (CVE-2014-0221)\nKIKUCHI Masashi discovered that OpenSSL incorrectly handled certain\nhandshakes. A remote attacker could use this flaw to perform a\nman-in-the-middle attack and possibly decrypt and modify traffic.\n(CVE-2014-0224)\nFelix Grö bert and Ivan Fratrić discovered that OpenSSL incorrectly handled\nanonymous ECDH ciphersuites. A remote attacker could use this issue to\ncause OpenSSL to crash, resulting in a denial of service. This issue only\naffected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS.\n(CVE-2014-3470)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2232-3\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2232-3/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'openssl'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|12\\.04 LTS|10\\.04 LTS|13\\.10)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libssl1.0.0:i386\", ver:\"1.0.1f-1ubuntu2.4\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libssl1.0.0\", ver:\"1.0.1-4ubuntu5.16\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libssl0.9.8\", ver:\"0.9.8k-7ubuntu8.19\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libssl1.0.0:i386\", ver:\"1.0.1e-3ubuntu1.6\", rls:\"UBUNTU13.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-10-02T15:18:38", "description": "VMware product updates address OpenSSL security vulnerabilities.", "cvss3": {}, "published": "2014-06-13T00:00:00", "type": "openvas", "title": "VMSA-2014-0006: VMware product updates address OpenSSL security vulnerabilities (remote check)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224", "CVE-2014-3470", "CVE-2010-5298", "CVE-2014-0198"], "modified": "2019-10-02T00:00:00", "id": "OPENVAS:1361412562310105045", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105045", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# VMSA-2014-0006: VMware product updates address OpenSSL security vulnerabilities (remote check)\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105045\");\n script_cve_id(\"CVE-2014-0224\", \"CVE-2014-0198\", \"CVE-2010-5298\", \"CVE-2014-3470\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_version(\"2019-10-02T07:08:50+0000\");\n script_name(\"VMSA-2014-0006: VMware product updates address OpenSSL security vulnerabilities (remote check)\");\n\n\n script_xref(name:\"URL\", value:\"http://www.vmware.com/security/advisories/VMSA-2014-0006.html\");\n\n script_tag(name:\"last_modification\", value:\"2019-10-02 07:08:50 +0000 (Wed, 02 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2014-06-13 11:04:01 +0100 (Fri, 13 Jun 2014)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_copyright(\"This script is Copyright (C) 2014 Greenbone Networks GmbH\");\n script_dependencies(\"gb_vmware_esx_web_detect.nasl\");\n script_mandatory_keys(\"VMware/ESX/build\", \"VMware/ESX/version\");\n\n script_tag(name:\"vuldetect\", value:\"Check the build number\");\n script_tag(name:\"insight\", value:\"a. OpenSSL update for multiple products.\n\nOpenSSL libraries have been updated in multiple products to versions 0.9.8za and 1.0.1h\nin order to resolve multiple security issues.\");\n script_tag(name:\"solution\", value:\"Apply the missing patch(es).\");\n script_tag(name:\"summary\", value:\"VMware product updates address OpenSSL security vulnerabilities.\");\n script_tag(name:\"affected\", value:\"ESXi 5.5 prior to ESXi550-201406401-SGi,\nESXi 5.1 without patch ESXi510-201406401-SG,\nESXi 5.0 without patch ESXi500-201407401-SG\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n\n}\n\ninclude(\"vmware_esx.inc\");\n\nif( ! esxVersion = get_kb_item( \"VMware/ESX/version\" ) ) exit( 0 );\nif( ! esxBuild = get_kb_item( \"VMware/ESX/build\" ) ) exit( 0 );\n\nfixed_builds = make_array( \"5.5.0\",\"1881737\",\n \"5.1.0\",\"1900470\",\n \"5.0.0\",\"1918656\");\n\nif( ! fixed_builds[esxVersion] ) exit( 0 );\n\nif( int( esxBuild ) < int( fixed_builds[esxVersion] ) )\n{\n security_message(port:0, data: esxi_remote_report( ver:esxVersion, build: esxBuild, fixed_build: fixed_builds[esxVersion] ) );\n exit(0);\n}\n\nexit( 99 );\n\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-01-31T18:38:41", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2015-10-16T00:00:00", "type": "openvas", "title": "SUSE: Security Advisory for OpenSSL (SUSE-SU-2014:0761-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0076", "CVE-2014-0224", "CVE-2014-3470", "CVE-2014-0221"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310850981", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850981", "sourceData": "# Copyright (C) 2015 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850981\");\n script_version(\"2020-01-31T07:58:03+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 07:58:03 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-10-16 16:03:30 +0200 (Fri, 16 Oct 2015)\");\n script_cve_id(\"CVE-2014-0076\", \"CVE-2014-0221\", \"CVE-2014-0224\", \"CVE-2014-3470\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"SUSE: Security Advisory for OpenSSL (SUSE-SU-2014:0761-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'OpenSSL'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"OpenSSL was updated to fix several vulnerabilities:\n\n * SSL/TLS MITM vulnerability. (CVE-2014-0224)\n\n * DTLS recursion flaw. (CVE-2014-0221)\n\n * Anonymous ECDH denial of service. (CVE-2014-3470)\n\n * Using the FLUSH+RELOAD Cache Side-channel Attack the nonces could\n have been recovered. (CVE-2014-0076)\n\n Additionally, the following non-security fixes and enhancements have been\n included in this release:\n\n * Ensure that the stack is marked non-executable on x86 32bit. On\n other processor platforms it was already marked as non-executable\n before. (bnc#870192)\n\n * IPv6 support was added to the openssl s_client and s_server command\n line tool. (bnc#859228)\n\n * The openssl command line tool now checks certificates by default\n against /etc/ssl/certs (this can be changed via the -CApath option).\n (bnc#860332)\n\n * The Elliptic Curve Diffie-Hellman key exchange selector was enabled\n and can be selected by kECDHE, kECDH, ECDH tags in the SSL cipher\n string. (bnc#859924)\n\n * If an optional openssl1 command line tool is installed in parallel,\n c_rehash uses it to generate certificate hashes in both OpenSSL 0\n and OpenSSL 1 style. This allows parallel usage of OpenSSL 0.9.8j\n and OpenSSL 1.x client libraries with a shared certificate store.\n (bnc#862181)\");\n\n script_tag(name:\"affected\", value:\"OpenSSL on SUSE Linux Enterprise Server 11 SP2 LTSS, SUSE Linux Enterprise Server 11 SP1 LTSS\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"SUSE-SU\", value:\"2014:0761-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=(SLES11\\.0SP2|SLES11\\.0SP1)\");\n\n script_xref(name:\"URL\", value:\"http://www.openssl.org/news/secadv_20140605.txt\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"SLES11.0SP2\") {\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8\", rpm:\"libopenssl0_9_8~0.9.8j~0.58.1\", rls:\"SLES11.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8-hmac\", rpm:\"libopenssl0_9_8-hmac~0.9.8j~0.58.1\", rls:\"SLES11.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"openssl\", rpm:\"openssl~0.9.8j~0.58.1\", rls:\"SLES11.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"openssl-doc\", rpm:\"openssl-doc~0.9.8j~0.58.1\", rls:\"SLES11.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8-32bit\", rpm:\"libopenssl0_9_8-32bit~0.9.8j~0.58.1\", rls:\"SLES11.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8-hmac-32bit\", rpm:\"libopenssl0_9_8-hmac-32bit~0.9.8j~0.58.1\", rls:\"SLES11.0SP2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"SLES11.0SP1\") {\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8\", rpm:\"libopenssl0_9_8~0.9.8j~0.58.1\", rls:\"SLES11.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8-hmac\", rpm:\"libopenssl0_9_8-hmac~0.9.8j~0.58.1\", rls:\"SLES11.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"openssl\", rpm:\"openssl~0.9.8j~0.58.1\", rls:\"SLES11.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"openssl-doc\", rpm:\"openssl-doc~0.9.8j~0.58.1\", rls:\"SLES11.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8-32bit\", rpm:\"libopenssl0_9_8-32bit~0.9.8j~0.58.1\", rls:\"SLES11.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libopenssl0_9_8-hmac-32bit\", rpm:\"libopenssl0_9_8-hmac-32bit~0.9.8j~0.58.1\", rls:\"SLES11.0SP1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "threatpost": [{"lastseen": "2018-10-06T22:58:44", "description": "There is a new, remotely exploitable [vulnerability in OpenSSL](<http://www.openssl.org/news/secadv_20140605.txt>) that could enable an attacker to intercept and decrypt traffic between vulnerable clients and servers. The flaw affects all versions of the OpenSSL client and versions 1.0.1 and 1.0.2-beta1 of the server software.\n\nThe new vulnerability could only be exploited to decrypt traffic between a vulnerable client and a vulnerable server, and the attacker would need to have a man-in-the-middle position on a network in order to do so. That\u2019s not an insignificant set of conditions that must be present for a successful attack, but in the current environment, where open wireless networks are everywhere and many users connect to them without a second thought, gaining a MITM position is not an insurmountable hurdle.\n\nResearchers who have looked at the vulnerable piece of code say that it appears to have existed, nearly unchanged, in the OpenSSL source since 1998.\n\n\u201cThe code changes are around the rejection of ChangeCipherSpec messages, which are messages sent during the TLS handshake that mark the change from unencrypted to encrypted traffic. These messages aren\u2019t part of the handshake protocol itself and aren\u2019t linked into the handshake state machine in OpenSSL. Rather there\u2019s a check in the code that they are only received when a new cipher is ready to be used,\u201d Adam Langley, a researcher on the security team at Google, wrote in an [analysis](<https://www.imperialviolet.org/2014/06/05/earlyccs.html>) of the vulnerability.\n\n\u201cHowever, that check (for s->s3->tmp.new_cipher in s3_pkt.c) seems reasonable, but new_cipher is actually set as soon as the cipher for the connection has been decided (i.e. once the ServerHello message has been sent/received), not when the cipher is actually ready! It looks like this is the problem that\u2019s getting fixed in this release.\u201d\n\nMasashi Kikuchi, the Japanese researcher who discovered the vulnerability, confirmed that the bug had been present in OpenSSL since the first version and that it likely should have been found sooner.\n\n\u201cThe biggest reason why the bug hasn\u2019t been found for over 16 years is that code reviews were insufficient, especially from experts who had experiences with TLS/SSL implementation. If the reviewers had enough experiences, they should have been verified OpenSSL code in the same way they do their own code. They could have detected the problem,\u201d Kikuchi said in his [explanation of the vulnerability](<http://ccsinjection.lepidum.co.jp/blog/2014-06-05/CCS-Injection-en/index.html>) and how he discovered it.\n\n\u201cFuzzing may have worked. However, as the history (see below) shows, knowledge of TLS/SSL implementation seems vital.\u201d\n\nThe CVE-2014-0224 bug surfaced two months after the OpenSSL Heartbleed vulnerability came to light.\n\nThe new CVE-2014-0224 bug surfaced two months after the [OpenSSL Heartbleed vulnerability](<https://threatpost.com/what-have-we-learned-openssl-heartbleed-bug/105385>) came to light. That flaw was considered more serious and affected a huge number of diverse systems and clients and administrators and security engineers scrambled to fix it before attackers began taking advantage of it. Heartbleed caused a lot of discussion and debate in the security community and even bled over into the mainstream, albeit not necessarily with the most accurate details.\n\nThis OpenSSL flaw is serious, as well, but likely won\u2019t cause the same sort of distress. Still, Langley said in his analysis that the vulnerability could have a variety of effects.\n\n\u201cThe implications of this are pretty complex. For a client there\u2019s an additional check in the code that requires that a CCS message appear before the Finished and after the master secret has been generated. An attacker can still inject an early CCS too and the keys will be calculated with an empty master secret. Those keys will be latched \u2013 another CCS won\u2019t cause them to be recalculated. However, when sending the second CCS that the client code requires, the Finished hash is recalculated with the correct master secret. This means that the attacker can\u2019t fabricate an acceptable Finished hash. This stops the obvious, generic impersonation attack against the client,\u201d Langley wrote.\n\n\u201cFor a server, there\u2019s no such check and it appears to be possible to send an early CCS message and then fabricate the Finished hash because it\u2019s based on an empty master secret. However, that doesn\u2019t obviously gain an attacker anything.\u201d\n\nThe vulnerability affects some mobile implementations of OpenSSL, as well. Google has already released an updated version of Chrome for Android to fix this issue in the mobile version of the browser.\n\nIn addition to the MITM vulnerability, OpenSSL fixed several other flaws in its latest release. Four of those vulnerabilities can be used to cause a denial-of-service, while the remaining one can allow remote code execution.\n", "cvss3": {}, "published": "2014-06-05T09:30:06", "type": "threatpost", "title": "New OpenSSL MITM Flaw Affects All Clients, Some Server Versions", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2014-06-09T14:04:16", "id": "THREATPOST:A5161FD8579FC8D6BD28F429682A17F9", "href": "https://threatpost.com/new-openssl-mitm-flaw-affects-all-clients-some-server-versions/106470/", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-10-06T22:58:40", "description": "Certain mitigating factors made the recent [OpenSSL man-in-the-middle vulnerability](<http://threatpost.com/new-openssl-mitm-flaw-affects-all-clients-some-server-versions/106470>) a notch or two below [Heartbleed](<http://threatpost.com/openssl-heartbleed-highlights-crypto-pitfalls/105628>) in terms of criticality. With that in consideration, it\u2019s probably no surprise that patching levels for CVE-2014-0224 aren\u2019t as high out of the gate as they were for Heartbleed.\n\nIvan Ristic, an application security researcher and director of engineering at Qualys, said that his company\u2019s research arm, SSL Labs, has been running a remote check for servers vulnerable to the bug. This week it ran that same [scan against a dataset maintained by SSL Pulse](<http://blog.ivanristic.com/2014/06/ssl-pulse-49-percent-vulnerable-to-cve-2014-0224-in-june-2014.html>), a global project that monitors the quality of SSL support, in order to quantify the scope of the problem affecting all OpenSSL client versions and version 1.0.1 of the server software.\n\nThe results weren\u2019t entirely discouraging to Ristic, who has done extensive SSL research.\n\nThe results weren\u2019t entirely discouraging to Ristic, who has done extensive SSL research. The comparison against the SSL Pulse data showed that about 49 percent of servers remain vulnerable, while 14 percent are exploitable.\n\n\u201cI\u2019d say they\u2019re decent,\u201dRistic said of the results. \u201cThe patching rate is not as good as with Heartbleed, but Heartbleed was much worse in terms of impact, and it was very well covered.\u201d\n\nThe scan revealed that about 36 percent of servers are running older versions of OpenSSL that are not exploitable. Those servers too, won\u2019t likely be patched in any urgency, Ristic said. Ristic estimates based on the presence of the Heartbleed extension that 24 percent of servers are running vulnerable versions of OpenSSL, meaning that about 38 percent were patched in the first week.\n\nThe flaw surfaced publicly on June 5, though experts said it\u2019s likely been in the OpenSSL codebase since Day 1 in 1998. The bug enables an attacker to remotely exploit clients or servers running vulnerable versions of OpenSSL to intercept and decrypt traffic. An attacker would have to be in a man-in-the-middle position to do so, not to mention that the bug can only be exploited if an attacker is sitting between both a vulnerable client and server.\n\n\u201cThat just reduces the number of exploitable systems. But I\u2019d say that the attack surface is still pretty big. There\u2019s probably lots of backend stuff using OpenSSL accessing APIs and such,\u201d Ristic said of the mitigating factors. \u201cOne decrypted connection means the password is compromised.\u201d\n\nAdam Langley of Google published an early [analysis](<https://www.imperialviolet.org/2014/06/05/earlyccs.html>) of the vulnerability pointing the finger at ChangeCipherSpec messages sent during the TLS handshake.\n\n\u201cThis vulnerability allows an active network attacker to inject ChangeCipherSpec (CCS) messages to both sides of a connection and force them to fix their keys before all key material is available,\u201d Ristic said. \u201cWeak keys are negotiated as a result.\u201d\n", "cvss3": {}, "published": "2014-06-13T14:05:55", "type": "threatpost", "title": "SSL Pulse Scans Quantify Vulnerable OpenSSL Servers", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2014-06-17T19:12:36", "id": "THREATPOST:79FD5014002E21B53F4970E1583AB7F2", "href": "https://threatpost.com/scans-quantify-vulnerable-openssl-servers/106665/", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-10-06T22:58:40", "description": "While the group of [vulnerabilities that the OpenSSL Project patched](<https://threatpost.com/new-openssl-mitm-flaw-affects-all-clients-some-server-versions/106470>) last week hasn\u2019t grown into the kind of mess that the Heartbleed flaw did, the vulnerabilities still affect a huge range of products. Vendors are still making their way through the patching process, and VMware has released an advisory confirming that a long list of its products are vulnerable to the latest OpenSSL bugs. The company said in the [advisory](<http://seclists.org/fulldisclosure/2014/Jun/71>) that there is only a patch available for one of its products right now, ESXi 5.5. VMware sells a huge line of products that includes both clients and servers, which makes the patching process for the most serious of the recent OpenSSL vulnerabilities even more onerous. The critical vulnerability in this group is CVE-2014-0224, a flaw that could enable an attacker to intercept and decrypt traffic between vulnerable clients and a vulnerable server. Both the client and server must be running flawed versions of the software in order for the attack to succeed.\n\nVMware said in its advisory that various products are affected differently by the vulnerability.\n\nVMware said in its advisory that various products are affected differently by the vulnerability, depending upon whether they\u2019re acting as clients or servers.\n\n\u201cCVE-2014-0224 may lead to a Man-in-the-Middle attack if a server is running a vulnerable version of OpenSSL 1.0.1 and clients are running a vulnerable version of OpenSSL 0.9.8 or 1.0.1. Updating the server will mitigate this issue for both the server and all affected clients,\u201d the advisory says.\n\n\u201cCVE-2014-0224 may affect products differently depending on whether the product is acting as a client or a server and of which version of OpenSSL the product is using.Clients that communicate over untrusted networks such as public Wi-Fi and communicate to a server running a vulnerable version of OpenSSL 1.0.1. can be mitigated by using a secure network such as VPN.\u201d\n\nThe list of other VMware products that are still vulnerable to CVE-2014-0224 and for which no patch is yet available is long, and includes both clients and servers. The company said that the patches for these products, which include other versions of ESXi, several versions of vCenter and vSphere, are in the works.\n", "cvss3": {}, "published": "2014-06-12T09:38:56", "type": "threatpost", "title": "VMware Patches ESXi Against OpenSSL Flaw, But Many Other Products Still Vulnerable", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2014-06-23T16:47:36", "id": "THREATPOST:9D9869F89AC0737D7BCF95D2D1CF13F8", "href": "https://threatpost.com/vmware-patches-esxi-against-openssl-flaw-but-many-other-products-still-vulnerable/106605/", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "oraclelinux": [{"lastseen": "2019-09-28T12:27:55", "description": "[0.9.7a-43.18.0.2]\n- fix for CVE-2014-0224 - SSL/TLS MITM vulnerability", "cvss3": {}, "published": "2014-06-11T00:00:00", "type": "oraclelinux", "title": "openssl security update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2014-06-11T00:00:00", "id": "ELSA-2014-3040", "href": "http://linux.oracle.com/errata/ELSA-2014-3040.html", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-09-28T12:33:36", "description": "[0.9.8e-29.2]\n- fix for CVE-2014-0224 - SSL/TLS MITM vulnerability", "cvss3": {}, "published": "2014-07-23T00:00:00", "type": "oraclelinux", "title": "openssl098e security update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2014-07-23T00:00:00", "id": "ELSA-2014-0680", "href": "http://linux.oracle.com/errata/ELSA-2014-0680.html", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-09-28T12:27:19", "description": "[0.9.8e-27.3]\n- fix for CVE-2014-0224 - SSL/TLS MITM vulnerability\n[0.9.8e-27.1]\n- replace expired GlobalSign Root CA certificate in ca-bundle.crt", "cvss3": {}, "published": "2014-06-05T00:00:00", "type": "oraclelinux", "title": "openssl security update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2014-06-05T00:00:00", "id": "ELSA-2014-0624", "href": "http://linux.oracle.com/errata/ELSA-2014-0624.html", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-05-29T18:38:56", "description": "[0.9.8e-18.0.1.el6_5.2]\n- Updated the description\n[0.9.8e-18.2]\n- fix for CVE-2014-0224 - SSL/TLS MITM vulnerability\n[0.9.8e-18]\n- fix for CVE-2012-2110 - memory corruption in asn1_d2i_read_bio() (#814185)", "cvss3": {}, "published": "2014-06-05T00:00:00", "type": "oraclelinux", "title": "openssl097a and openssl098e security update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2014-0224", "CVE-2012-2110"], "modified": "2014-06-05T00:00:00", "id": "ELSA-2014-0626", "href": "http://linux.oracle.com/errata/ELSA-2014-0626.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nodejsblog": [{"lastseen": "2023-03-09T04:11:28", "description": "# OpenSSL and Breaking UTF-8 Change (fixed in Node v0.8.27 and v0.10.29)\n\n2014-06-16\n\nToday we are releasing new versions of Node:\n\n * [node-v0.8.27](<https://nodejs.org/dist/v0.8.27>)\n * [node-v0.10.29](<https://nodejs.org/dist/v0.10.29>)\n\nFirst and foremost these releases address the current OpenSSL vulnerability [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>), for both 0.8 and 0.10 we've upgraded the version of the bundled OpenSSL to their fixed versions v1.0.0m and v1.0.1h respectively.\n\nAdditionally these releases address the fact that V8 UTF-8 encoding would allow unmatched surrogate pairs. That is to say, previously you could construct a valid JavaScript string (which are stored internally as UCS-2), pass it to a `Buffer` as UTF-8, send and consume that string in another process and it would fail to interpret because the UTF-8 string was invalid.\n\nNote, the results encoded by V8 in this case are exactly what was passed into the encoding routine. There is no overflow, underflow, or the inclusion of other arbitrary memory, merely an unmatched UTF-8 surrogate resulting in invalid UTF-8.\n\nAs of these releases, if you try and pass a string with an unmatched surrogate pair, Node will replace that character with the unknown unicode character (U+FFFD). To preserve the old behavior set the environment variable `NODE_INVALID_UTF8` to anything (even nothing). If the environment variable is present at all it will revert to the old behavior.\n\nThis breaks backward compatibility for the specific reason that unsanitized strings sent as a text payload for an RFC compliant WebSocket implementation should result in the disconnection of the client. If the client attempts to reconnect and receives another invalid payload it must disconnect again. If there is no logic to handle the reconnection attempts, this may lead to a denial of service attack. For instance `socket.io` attempts to reconnect by default.\n \n \n // Prior to these releases:\n new Buffer('ab\ufffdcd', 'utf8');\n // <Buffer 61 62 ed a0 80 63 64>\n \n // After this release:\n new Buffer('ab\ufffdcd', 'utf8');\n // <Buffer 61 62 ef bf bd 63 64>\n \n // This is an explicit conversion to a Buffer, but the implicit\n // .write('ab\ufffdcd') also results in the same pattern\n websocket.write(new Buffer('ab\ufffdcd', 'utf8'));\n // This would result in the client disconnecting.\n \n\nNode's default encoding for strings is `UTF-8`, so even if you're not explicitly creating `Buffer`s out of strings, Node may be doing so under the hood. If what you're passing is not actually `UTF-8` then when you call `.write(str)` you could be specific and say `.write(str, 'binary')` which signals Node to pass the string through without interpreting it.\n\nYou can also mitigate this in pure JavaScript by sanitizing your strings, as an example see [node-unicode-sanitize](<https://github.com/felixge/node-unicode-sanitize/blob/master/index.js>) which will similarly replace unmatched surrogate pairs with the unknown unicode character.\n\nThanks to Node.js alum Felix Geisend\u00f6rfer for finding, getting the fixes [upstreamed](<https://code.google.com/p/v8/source/detail?r=18683>), and helping with the testing and mitigation. Also for helping to inform and improve the process for Node.js security issues.\n\nTo float these fixes in your own builds you can apply the following patch with `git am`\n\n * For v0.10 branch <https://gist.github.com/tjfontaine/f869f373a8e9416809ba/raw/e3eb85201413a79d12ce24a7cb4b02edf0abc1a5/v0.10-invalid-utf8.patch>\n * For v0.8 branch <https://gist.github.com/tjfontaine/f869f373a8e9416809ba/raw/8633aba88fa867a88b1b3ab88d13671a78dab187/v0.8-invalid-utf8.patch>\n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2014-06-16T00:00:00", "type": "nodejsblog", "title": "OpenSSL and Breaking UTF-8 Change (fixed in Node v0.8.27 and v0.10.29)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2014-06-16T00:00:00", "id": "NODEJSBLOG:OPENSSL-AND-UTF8", "href": "https://nodejs.org/en/blog/vulnerability/openssl-and-utf8/", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "amazon": [{"lastseen": "2023-05-27T11:45:05", "description": "**Issue Overview:**\n\nIt was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server. (CVE-2014-0224)\n\n \n**Affected Packages:** \n\n\nopenssl097a\n\n \n**Issue Correction:** \nRun _yum update openssl097a_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n \u00a0\u00a0\u00a0 openssl097a-0.9.7a-12.1.9.amzn1.i686 \n \u00a0\u00a0\u00a0 openssl097a-debuginfo-0.9.7a-12.1.9.amzn1.i686 \n \n src: \n \u00a0\u00a0\u00a0 openssl097a-0.9.7a-12.1.9.amzn1.src \n \n x86_64: \n \u00a0\u00a0\u00a0 openssl097a-debuginfo-0.9.7a-12.1.9.amzn1.x86_64 \n \u00a0\u00a0\u00a0 openssl097a-0.9.7a-12.1.9.amzn1.x86_64 \n \n \n\n### Additional References\n\nRed Hat: [CVE-2014-0224](<https://access.redhat.com/security/cve/CVE-2014-0224>)\n\nMitre: [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2014-06-05T15:38:00", "type": "amazon", "title": "Important: openssl097a", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2014-09-19T10:19:00", "id": "ALAS-2014-351", "href": "https://alas.aws.amazon.com/ALAS-2014-351.html", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-05-27T11:45:07", "description": "**Issue Overview:**\n\nIt was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server. (CVE-2014-0224)\n\n \n**Affected Packages:** \n\n\nopenssl098e\n\n \n**Issue Correction:** \nRun _yum update openssl098e_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n \u00a0\u00a0\u00a0 openssl098e-debuginfo-0.9.8e-18.2.13.amzn1.i686 \n \u00a0\u00a0\u00a0 openssl098e-0.9.8e-18.2.13.amzn1.i686 \n \n src: \n \u00a0\u00a0\u00a0 openssl098e-0.9.8e-18.2.13.amzn1.src \n \n x86_64: \n \u00a0\u00a0\u00a0 openssl098e-debuginfo-0.9.8e-18.2.13.amzn1.x86_64 \n \u00a0\u00a0\u00a0 openssl098e-0.9.8e-18.2.13.amzn1.x86_64 \n \n \n\n### Additional References\n\nRed Hat: [CVE-2014-0224](<https://access.redhat.com/security/cve/CVE-2014-0224>)\n\nMitre: [CVE-2014-0224](<https://vulners.com/cve/CVE-2014-0224>)\n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2014-06-05T15:38:00", "type": "amazon", "title": "Important: openssl098e", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2014-09-18T00:40:00", "id": "ALAS-2014-350", "href": "https://alas.aws.amazon.com/ALAS-2014-350.html", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "arista": [{"lastseen": "2023-03-13T17:32:52", "description": "## Security Advisory 0005 PDF\n\n**Date:** 6/9/2014\n\nRevision | Date | Changes \n---|---|--- \n1.0 | June 9th 2014 | Initial release \n1.1 | June 12th 2014 | Addition of patch installation details \n1.2 | July 6th 2015 | Updated patch file \n \n**Open SSL clients running on Arista EOS vulnerable to SSL/TLS MITM vulnerability (CVE-2014-0224)**\n\nOn June 5th, the OpenSSL project issued a security advisory for a vulnerability that could allow a man in the middle attack (MITM) against an encrypted connection. The attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1.\n\nAll current shipping versions of EOS are affected by this vulnerability. Features that use SSL clients and are therefore impacted are XMPP and the \"copy\" command from the CLI when used in a manner that would involve SSL ( i.e. by using a https:// URL ). Features in EOS not impacted that run SSL Servers are CAPI, VMTracer and WBEM. These features are not impacted because EOS uses Openssl-1.0.0e which is not a vulnerable version.\n\nA software patch (RPM extension) is available for download. In addition currently supported versions of EOS will receive an updated version with the fix for this vulnerability. Currently supported versions of EOS include 4.9 through 4.13.\n\nBugID 90769 addresses this issue.\n\n**Workaround:** \nTo mitigate this issue customers can:\n\n 1. Use SCP as an alternative to \u201chttps copy\u201d commands.\n 2. Ensure servers are running remediated versions of OpenSSL or alternate SSL solutions.\n\n**References:** \nFor more information about the vulnerability, please visit: \n<http://www.openssl.org/news/secadv_20140605.txt>\n\n**Verification:** \nVerification of the OpenSSL version running in EOS\n \n \n switch# show version detail |grep -i openssl \n openssl\u00a0**1.0.0e**.Ar 1709429.4134F.1\n\n \n**Resolution: ** \nThe resolution to this issue is through the installation of a patch, or through upgrading to a version of EOS that contains the resolution. This section will be updated once EOS releases are available.\n\nDownload URL for patch: SecurityAdvisory0005Patch.swix\n\n**\ufffc\ufffcInstructions to install the patch for Security Advisory 0005**\n\nThe extension is applicable for all EOS versions 4.9.0 - 4.13.6 inclusive.\n\nStep 1. Copy the file SecurityAdvisory0005Patch.swix to the extension partition of the Arista switch using any of the supported file transfer protocols:\n \n \n switch#copy scp://This email address is being protected from spambots. You need JavaScript enabled to view it./home/arista/SecAdvisory005Patch.swix extension:\n\n \nStep 2. Ensure that the file has been copied to the extensions partition and verify the checksum of the copied file:\n \n \n switch#show extensions \n Name Version/Release Status RPMs \n ------------------------------------ ------------------------- ------ ---- \n SecurityAdvisory0005Patch.swix 1.0.0e.Ar/2506963.secAdvi A, NI 1 \n \n A: available | NA: not available | I: installed | NI: not installed | F:forced\n \n \n \n sha512sum: f7bdda045eb15d72cdb2c7bce709d7ebfef4b796667b41becd441c87511a093388d9eb5fab240c97a6addddc4d1a02a430fb1c8cb88e4a9385408e6cb13cb0bf\n \n \n switch#verify /sha512 extension:SecurityAdvisory0005Patch.swix \n verify /sha512 (extension:SecurityAdvisory0005Patch.2.swix) = f7bdda045eb15d72cdb2c7bce709d7ebfef4b796667b41becd441c87511a093388d9eb5fab240c97a6addddc4d1a02a430fb1c8cb88e4a9385408e6cb13cb0bf\n\n \nStep 3. The patch is installed as an extension, and upon installation into a live system will automatically install with the following behavior:\n\n * Cause ProcMgr to reload it's cached dynamic libraries, including the libssl library containing the change (Impact: Non-disruptive)\n * Restart the FastClid-server (Impact: Non-disruptive)\n * Restart the Xmpp agent if it is running (Impact: Brief disruption to the Xmpp service only)\n \n \n switch#extension SecurityAdvisory0005Patch.swix\n\n \n**Notes:**\n\n 1. All modular switches with dual supervisors require the extension copying and installing on both supervisors.\n 2. For systems that have not been patched it is possible when installing the extension it may claim a newer version is already installed. It is recommended to install the extension with the \u201cforce\u201d keyword at that point.\n\nOnce installed, a series of log messages are expected as shown below. \nProcMgr warm restart to reload cached dynamic libraries:\n \n \n Jun 12 12:27:54 sq393 ProcMgr-master: %PROCMGR-6-MASTER_STARTED: Master ProcMgr process started. (PID=24770) \n Jun 12 12:27:54 sq393 ProcMgr-master: %PROCMGR-6-MASTER_RUNNING: Master ProcMgr (PID=24770) monitoring ProcMgr worker (PID=24771) \n Jun 12 12:27:54 sq393 ProcMgr-worker: %PROCMGR-6-WORKER_COLDSTART: New ProcMgr worker cold start. (PID=24771) (Master ProcMgr PID=24770) \n Jun 12 12:27:54 sq393 ProcMgr-worker: %PROCMGR-6-WORKER_WARMSTART: ProcMgr worker warm start. (PID=24771) \n Jun 12 12:27:54 sq393 ProcMgr-worker: %PROCMGR-7-NEW_PROCESSES: New processes configured to run under ProcMgr control: ['Aaa', 'Acl', 'AgentMonitor', 'Arp', 'Bfd', 'CpuComplex', 'DhcpRelay', 'Dot1x', 'Ebra', 'EventMon', 'FanDetector', 'FastClid', 'Fhrp', 'Fru', 'IgmpHostProxy', 'IgmpSnooping', 'Ira', 'LacpTxAgent', 'Lag', 'Launcher', 'LedPolicy', 'Lldp', 'Lm73', 'Max6658', 'Mirroring', 'Mlag', 'MlagTunnel', 'Mpls', 'Msdp', 'NetworkTopology', 'PciBus', 'PhyEthtool', 'Picasso', 'Pmbus', 'PortSec', 'PowerManager', 'PowerSupplyDetector', 'Qos', 'Rib', 'Sb820', 'Scd', 'Smbus', 'Snmp', 'Sol', 'Stp', 'StpTopology', 'Strata-FixedSystem', 'StrataCentral', 'SuperServer', 'Sysdb', 'Thermostat', 'TopoAgent', 'Ucd9012', 'Xcvr'] \n Jun 12 12:27:54 sq393 ProcMgr-worker: %PROCMGR-7-PROCESSES_ADOPTED: ProcMgr (PID=24771) adopted running processes: (Stp, PID=2560) (SuperServer, PID=1922) (Sysdb, PID=1668) (Bfd, PID=2053) (Fru, PID=1670) (Launcher, PID=1671) (Qos, PID=2056) (Smbus, PID=2826) (LedPolicy, PID=2190) (FanDetector, PID=2937) (Rib, PID=2193) (Xcvr, PID=2966) (LacpTxAgent, PID=1945) (AgentMonitor, PID=1946) (Mirroring, PID=1947) (Ebra, PID=2103) (Mlag, PID=2011) (NetworkTopology, PID=1972) (PhyEthtool, PID=2889) (Ira, PID=2055) (PowerManager, PID=2099) (EventMon, PID=2484) (Fhrp, PID=2101) (Lag, PID=2486) (IgmpSnooping, PID=1975) (Pmbus, PID=3079) (Aaa, PID=2361) (DhcpRelay, PID=2364) (Arp, PID=2295) (StrataCentral, PID=3010) (Acl, PID=1974) (Snmp, PID=2249) (Mpls, PID=2378) (Sol, PID=2679) (Lm73, PID=2914) (IgmpHostProxy, PID=2126) (Ucd9012, PID=2771) (Sb820, PID=2773) (PciBus, PID=2775) (StpTopology, PID=2523) (Max6658, PID=2910) (CpuComplex, PID=2911) (PowerSupplyDetector, PID=2913) (PortSec, PID=2146) (MlagTunnel, PID=2228) (Strata-FixedSystem, PID=3177) (Picasso, PID=2410) (Msdp, PID=2414) (TopoAgent, PID=2035) (Dot1x, PID=2036) (Scd, PID=2807) (Lldp, PID=2553) (Thermostat, PID=2298) \n Jun 12 12:27:54 sq393 ProcMgr-worker: %PROCMGR-7-WORKER_WARMSTART_DONE: ProcMgr worker warm start done. (PID=24771)\n\n \nRestart of FastClid process:\n \n \n Jun 12 12:27:54 sq393 ProcMgr-worker: %PROCMGR-6-PROCESS_STARTED: 'FastClid' starting with PID=24772 (PPID=24771) -- execing '/usr/bin/FastClid'\n\n \nRestart of Xmpp process:\n \n \n Jun 12 16:09:16 sq393 ProcMgr-worker: %PROCMGR-6-PROCESS_STARTED: 'Xmpp' starting with PID=4546 (PPID=4544) -- execing '/usr/bin/Xmpp'\n\n \nVerify that the extension has been installed:\n \n \n switch#show extensions \n Name Version/Release Status RPMs \n ------------------------------------ ------------------------- ------ ---- \n SecurityAdvisory0005Patch.swix 1.0.0e.Ar/2506963.secAdvi A,I 1 \n \n A: available | NA: not available | I: installed | NI: not installed | F:forced\n\n \nStep 4. At this point all existing Cli sessions should be restarted to use the fixed version of openssl when performing \"copy\" commands.\n\n**Notes:** \nRedHat released a tool to detect CCS vulnerabilities here: https://access.redhat.com/labs/ccsinjectiontest/ along with an offline script. On server features that this is tested against ( for example, Capi ) this will falsely report that they are affected on agents that are not running the patched version. This is because the script is looking for the alarm that occurs in patched versions. SSL Servers were never affected due to their running of pre-vulnerability code. If the agent is restarted after installing the extension ( ex. via \"agent Capi shutdown\" \"no agent Capi shutdown\" ) the agent will load the new library which will return alarms satisfying the script.\n\nStep 5. Make the extension persist across reboots:\n \n \n switch#copy installed-extensions boot-extensions \n switch#show boot-extensions \n SecurityAdvisory0005Patch.swix\n\n \nVerification of the OpenSSL version after resolution:\n \n \n switch#sh ver det | grep -i openssl \n openssl 1.0.0e.Ar 2506963.secAdvisory0005.6\n\n \n**For More Information:** \nIf you require further assistance, or if you have any further questions regarding this security notice, please contact the Arista Networks Technical Assistance Center (TAC) by one of the following methods:\n\nOpen a Service Request: \nBy email: This email address is being protected from spambots. You need JavaScript enabled to view it. \nBy telephone: 408-547-5502 \n866-476-0000\n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2014-06-09T00:00:00", "type": "arista", "title": "Security Advisory 0005", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2014-06-09T00:00:00", "id": "ARISTA:0005", "href": "https://www.arista.com/en/support/advisories-notices/security-advisory/941-security-advisory-0005", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "checkpoint_security": [{"lastseen": "2023-04-17T15:50:19", "description": "\n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2014-06-05T21:00:00", "type": "checkpoint_security", "title": "SSL/TLS MITM vulnerability (CVE-2014-0224)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0224"], "modified": "2014-06-05T21:00:00", "id": "CPS:SK101186", "href": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk101186", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "nessus": [{"lastseen": "2021-09-07T23:35:29", "description": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", "cvss3": {}, "published": "2021-08-10T00:00:00", "type": "nessus", "title": "Redhat Enterprise Unspecified Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2021-08-10T00:00:00", "cpe": ["cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:application_processing_engine_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:cp1543-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:rox_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:s7-1500_firmware:*:*:*:*:*:*:*:*"], "id": "OT_500473.NASL", "href": "https://www.tenable.com/plugins/ot/500473", "sourceData": "File data ot_500473.nasl", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-05-18T14:22:35", "description": "The version of HP Onboard Administrator installed on the remote host is prior to 4.22. It is, therefore, affected by the following OpenSSL related vulnerability :\n\n - An unspecified error exists that could allow an attacker to cause usage of weak keying material leading to simplified man-in-the-middle attacks.\n (CVE-2014-0224)", "cvss3": {}, "published": "2014-07-03T00:00:00", "type": "nessus", "title": "HP Onboard Administrator < 4.22 Remote Information Disclosure", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-11-26T00:00:00", "cpe": ["cpe:/a:hp:onboard_administrator"], "id": "HP_ONBOARD_ADMIN_4_22.NASL", "href": "https://www.tenable.com/plugins/nessus/76357", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(76357);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/26\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n script_xref(name:\"CERT\", value:\"978508\");\n script_xref(name:\"HP\", value:\"HPSBMU03058\");\n script_xref(name:\"IAVB\", value:\"2014-B-0084\");\n\n script_name(english:\"HP Onboard Administrator < 4.22 Remote Information Disclosure\");\n script_summary(english:\"Checks the version of HP Onboard Administrator.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote server is affected by a remote information disclosure\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of HP Onboard Administrator installed on the remote host\nis prior to 4.22. It is, therefore, affected by the following OpenSSL\nrelated vulnerability :\n\n - An unspecified error exists that could allow an\n attacker to cause usage of weak keying material\n leading to simplified man-in-the-middle attacks.\n (CVE-2014-0224)\");\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c04351097\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7496652c\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to version 4.22 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-0224\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/07/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:hp:onboard_administrator\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"hp_onboard_admin_detect.nasl\");\n script_require_keys(\"Host/HP/Onboard_Administrator\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nport = get_kb_item_or_exit(\n \"Host/HP/Onboard_Administrator/Port\",\n exit_code : 1,\n msg : \"Unable to get the HP Onboard Administrator Port.\"\n);\n\nversion = get_kb_item_or_exit(\n \"Host/HP/Onboard_Administrator/Version\",\n exit_code : 1,\n msg : \"Unable to get the HP Onboard Administrator Version.\"\n);\n\nfix = \"4.22\";\n\nif (ver_compare(ver:version, fix:fix, strict:FALSE) >= 0) audit(AUDIT_HOST_NOT, \"affected\");\n\nreport = NULL;\nif (report_verbosity > 0)\n{\n report =\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix + '\\n';\n}\nsecurity_warning(port:port, extra:report);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:24:30", "description": "The remote host is running a version of Palo Alto Networks PAN-OS prior to 5.0.14 / 5.1.9 / 6.0.4. It is, therefore, affected by a flaw in the included OpenSSL library that can cause the client or server to use weak keying material, which a remote attacker can exploit to conduct a man-in-the-middle attack.", "cvss3": {}, "published": "2014-10-20T00:00:00", "type": "nessus", "title": "Palo Alto Networks PAN-OS < 5.0.14 / 5.1.x < 5.1.9 / 6.0.x < 6.0.4 OpenSSL MitM", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2018-07-24T00:00:00", "cpe": ["cpe:/o:paloaltonetworks:pan-os"], "id": "PALO_ALTO_PAN-SA-2014-0003.NASL", "href": "https://www.tenable.com/plugins/nessus/78586", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78586);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/07/24 18:56:13\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n script_xref(name:\"CERT\", value:\"978508\");\n\n script_name(english:\"Palo Alto Networks PAN-OS < 5.0.14 / 5.1.x < 5.1.9 / 6.0.x < 6.0.4 OpenSSL MitM\");\n script_summary(english:\"Checks the PAN-OS version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"The remote host is affected by a man-in-the-middle vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is running a version of Palo Alto Networks PAN-OS\nprior to 5.0.14 / 5.1.9 / 6.0.4. It is, therefore, affected by a flaw\nin the included OpenSSL library that can cause the client or server to\nuse weak keying material, which a remote attacker can exploit to\nconduct a man-in-the-middle attack.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://securityadvisories.paloaltonetworks.com/Home/Detail/23\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to PAN-OS version 5.0.14 / 5.1.9 / 6.0.4 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\nscript_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/20\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:paloaltonetworks:pan-os\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Palo Alto Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"palo_alto_version.nbin\");\n script_require_keys(\"Host/Palo_Alto/Firewall/Version\", \"Host/Palo_Alto/Firewall/Full_Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\napp_name = \"Palo Alto Networks PAN-OS\";\nversion = get_kb_item_or_exit(\"Host/Palo_Alto/Firewall/Version\");\nfull_version = get_kb_item_or_exit(\"Host/Palo_Alto/Firewall/Full_Version\");\nfix = NULL;\n\n# Ensure sufficient granularity.\nif (version !~ \"^\\d+\\.\\d+\") audit(AUDIT_VER_NOT_GRANULAR, app_name, full_version);\n\nif (version =~ \"^5\\.1($|[^0-9])\")\n fix = \"5.1.9\";\nelse if (version =~ \"^6\\.0($|[^0-9])\")\n fix = \"6.0.4\";\nelse\n fix = \"5.0.14\";\n\n# Compare version to fix and report as needed.\nif (ver_compare(ver:version, fix:fix, strict:FALSE) == -1)\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Installed version : ' + full_version +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_warning(extra:report, port:0);\n }\n else security_warning(0);\n}\nelse audit(AUDIT_INST_VER_NOT_VULN, app_name, full_version);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:21:22", "description": "Description of changes:\n\n[0.9.7a-43.18.0.2]\n- fix for CVE-2014-0224 - SSL/TLS MITM vulnerability", "cvss3": {}, "published": "2014-06-12T00:00:00", "type": "nessus", "title": "Oracle Linux 4 : openssl (ELSA-2014-3040)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2021-01-14T00:00:00", "cpe": ["cpe:/o:oracle:linux:4", "p-cpe:/a:oracle:linux:openssl", "p-cpe:/a:oracle:linux:openssl-devel", "p-cpe:/a:oracle:linux:openssl-perl"], "id": "ORACLELINUX_ELSA-2014-3040.NASL", "href": "https://www.tenable.com/plugins/nessus/74484", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2014-3040.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74484);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n\n script_name(english:\"Oracle Linux 4 : openssl (ELSA-2014-3040)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Description of changes:\n\n[0.9.7a-43.18.0.2]\n- fix for CVE-2014-0224 - SSL/TLS MITM vulnerability\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-June/004193.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected openssl packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:X/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:openssl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:openssl-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:openssl-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 4\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"openssl-0.9.7a-43.18.0.2.el4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"ia64\", reference:\"openssl-0.9.7a-43.18.0.2.el4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"openssl-0.9.7a-43.18.0.1.el4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"openssl-devel-0.9.7a-43.18.0.2.el4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"ia64\", reference:\"openssl-devel-0.9.7a-43.18.0.2.el4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"openssl-devel-0.9.7a-43.18.0.1.el4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"openssl-perl-0.9.7a-43.18.0.2.el4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"ia64\", reference:\"openssl-perl-0.9.7a-43.18.0.2.el4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"openssl-perl-0.9.7a-43.18.0.1.el4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"openssl / openssl-devel / openssl-perl\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:21:37", "description": "Updated openssl097a and openssl098e packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6 respectively.\n\nThe Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.\n(CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL. For more information about this flaw, refer to: https://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter of this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.", "cvss3": {}, "published": "2014-06-06T00:00:00", "type": "nessus", "title": "CentOS 5 / 6 : openssl097a / openssl098e (CESA-2014:0626)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:openssl097a", "p-cpe:/a:centos:centos:openssl098e", "cpe:/o:centos:centos:5", "cpe:/o:centos:centos:6"], "id": "CENTOS_RHSA-2014-0626.NASL", "href": "https://www.tenable.com/plugins/nessus/74335", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:0626 and \n# CentOS Errata and Security Advisory 2014:0626 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74335);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_xref(name:\"RHSA\", value:\"2014:0626\");\n\n script_name(english:\"CentOS 5 / 6 : openssl097a / openssl098e (CESA-2014:0626)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated openssl097a and openssl098e packages that fix one security\nissue are now available for Red Hat Enterprise Linux 5 and 6\nrespectively.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL\nv2/v3) and Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to\ndecrypt and modify traffic between a client and a server.\n(CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client\nmust be using a vulnerable version of OpenSSL; the server must be\nusing OpenSSL version 1.0.1 and above, and the client must be using\nany version of OpenSSL. For more information about this flaw, refer\nto: https://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this\nissue. Upstream acknowledges KIKUCHI Masashi of Lepidum as the\noriginal reporter of this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. For the update\nto take effect, all services linked to the OpenSSL library (such as\nhttpd and other SSL-enabled services) must be restarted or the system\nrebooted.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-June/020345.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fd30e81d\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-June/020346.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?05f3ced1\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected openssl097a and / or openssl098e packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-0224\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:openssl097a\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:openssl098e\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x / 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"openssl097a-0.9.7a-12.el5_10.1\")) flag++;\n\nif (rpm_check(release:\"CentOS-6\", reference:\"openssl098e-0.9.8e-18.el6_5.2\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"openssl097a / openssl098e\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:24:13", "description": "The remote HP printer is affected by a security bypass vulnerability.\nThe included OpenSSL library has a security bypass flaw in the handshake process. By using a specially crafted handshake, a remote attacker can force the use of weak keying material. This could be leveraged for a man-in-the-middle attack.", "cvss3": {}, "published": "2014-10-09T00:00:00", "type": "nessus", "title": "HP Printers Security Bypass (HPSBPI03107)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-11-25T00:00:00", "cpe": ["cpe:/h:hp:laserjet"], "id": "HP_LASERJET_HPSBPI03107.NASL", "href": "https://www.tenable.com/plugins/nessus/78110", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78110);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/25\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n script_xref(name:\"CERT\", value:\"978508\");\n script_xref(name:\"HP\", value:\"emr_na-c04451722\");\n script_xref(name:\"HP\", value:\"HPSBPI03107\");\n\n script_name(english:\"HP Printers Security Bypass (HPSBPI03107)\");\n script_summary(english:\"Checks the firmware datecode.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote printer is affected by a security bypass vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote HP printer is affected by a security bypass vulnerability.\nThe included OpenSSL library has a security bypass flaw in the\nhandshake process. By using a specially crafted handshake, a remote\nattacker can force the use of weak keying material. This could be\nleveraged for a man-in-the-middle attack.\");\n # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c04451722\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f055628e\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the firmware in accordance with the vendor's advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-0224\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:hp:laserjet\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"hp_pjl_version.nbin\", \"hp_laserjet_detect.nasl\");\n script_require_ports(\"www/hp_laserjet/pname\", \"pjl/model\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n# Remove and fix words in the printer's name that don't match the list\n# on the Web site (designed to reduce false negatives). Also convert the\n# name to uppercase and remove spaces to make it as unlikely as possible that\n# we miss anything.\nfunction normalize_model(model)\n{\n local_var series_to_remove, series, words_to_remove, word;\n\n model = toupper(model);\n\n #Remove any the generic series number from product name\n series_to_remove = make_list(' 100 ', ' 300 ', ' 400 ', ' 500 ', ' 600 ', ' 700 ');\n foreach series(series_to_remove)\n model = str_replace(string:model, find:series, replace:' ');\n\n words_to_remove = make_list( 'COLOR', 'EDGELINE', 'ENTERPRISE', 'FLOW', 'HP', 'HOTSPOT', 'LASERJET', 'MFP', 'MULTIFUNCTION', 'PRINTER', 'PROFESSIONAL', 'PRO', 'SERIES', 'SCANJET', 'TOPSHOT', 'WITH', 'ALL', 'IN', 'ONE', 'DIGITAL', 'SENDER', '-', 'FN1', 'DOCUMENT', 'CAPTURE', 'WORKSTATION' );\n foreach word(words_to_remove)\n model = str_replace(string:model, find:word, replace:'');\n\n model = str_replace(string:model, find:' ', replace:'');\n\n return model;\n}\n\nport = get_service(svc:\"jetdirect\", exit_on_fail:TRUE);\n\nmodel = get_kb_item('pjl/model');\nif (!model) model = get_kb_item('www/hp_laserjet/pname');\nif (!model) exit(1, \"Failed to get the HP model number.\");\n\nfirmware = int(get_kb_item('pjl/firmware'));\nif (!firmware) firmware = int(get_kb_item('www/hp_laserjet/fw'));\nif (!firmware) exit(1, \"Failed to get the HP firmware version.\");\n\nserial = get_kb_item('www/hp_laserjet/serial');\nif (!serial) serial = get_kb_item('pjl/serial');\nif (!serial) serial = \"unknown\";\n\n\n# From support.hp.com searches\nsigning_firmware = make_array(\n #\"HP LaserJet 400 MFP M425dn\", 20140731, # <---- uncomment for testing\n \"HP Color LaserJet CM4540 MFP\", 20140731,\n \"HP Color LaserJet CM4540f MFP\", 20140731,\n \"HP Color LaserJet CM4540fskm MFP\", 20140731,\n \"HP Color LaserJet CP5525n\", 20140731,\n \"HP Color LaserJet CP5525dn\", 20140731,\n \"HP Color LaserJet CP5525xh\", 20140731,\n \"HP Color LaserJet Enterprise M750n\", 20140731,\n \"HP Color LaserJet Enterprise M750dn\", 20140731,\n \"HP Color LaserJet Enterprise M750xh\", 20140731,\n \"HP Color LaserJet M651n\", 20140731,\n \"HP Color LaserJet M651dn\", 20140731,\n \"HP Color LaserJet M651xh\", 20140731,\n \"HP Color LaserJet M680f\", 20140731,\n \"HP Color LaserJet M680dn\", 20140731,\n \"HP Color LaserJet Flow M680z\", 20140731,\n \"HP LaserJet Enterprise 500 color MFP M575f\", 20140731,\n \"HP LaserJet Enterprise 500 color MFP M575dn\", 20140731,\n \"HP LaserJet Enterprise 500 MFP M525f\", 20140731,\n \"HP LaserJet Enterprise 500 MFP M525dn\", 20140731,\n \"HP LaserJet Enterprise 600 M601n\", 20140731,\n \"HP LaserJet Enterprise 600 M601dn\", 20140731,\n \"HP LaserJet Enterprise 600 M602n\", 20140731,\n \"HP LaserJet Enterprise 600 M602dn\", 20140731,\n \"HP LaserJet Enterprise 600 M602x\", 20140731,\n \"HP LaserJet Enterprise 600 M603n\", 20140731,\n \"HP LaserJet Enterprise 600 M603dn\", 20140731,\n \"HP LaserJet Enterprise 600 M603xh\", 20140731,\n \"HP LaserJet Enterprise MFP M630dn\", 20140731,\n \"HP LaserJet Enterprise MFP M630f\", 20140731,\n \"HP LaserJet Enterprise MFP M630h\", 20140731,\n \"HP LaserJet Enterprise Flow MFP M630z\", 20140731,\n \"HP LaserJet Enterprise 700 color M775dn\", 20140731,\n \"HP LaserJet Enterprise 700 color M775f\", 20140731,\n \"HP LaserJet Enterprise 700 color M775z\", 20140731,\n \"HP LaserJet Enterprise 700 color M775z+\", 20140731,\n \"HP LaserJet Enterprise 700 M712n\", 20140731,\n \"HP LaserJet Enterprise 700 M712dn\", 20140731,\n \"HP LaserJet Enterprise 700 M712xh\", 20140731,\n \"HP LaserJet Enterprise 800 color M855dn\", 20140731,\n \"HP LaserJet Enterprise 800 color M855xh\", 20140731,\n \"HP LaserJet Enterprise 800 color M855x+\", 20140731,\n \"HP LaserJet Enterprise 800 color MFP M880z\", 20140731,\n \"HP LaserJet Enterprise 800 color MFP M880z+\", 20140731,\n \"HP LaserJet Enterprise Color 500 M551n\", 20140731,\n \"HP LaserJet Enterprise Color 500 M551dn\", 20140731,\n \"HP LaserJet Enterprise Color 500 M551xh\", 20140731,\n \"HP LaserJet Enterprise color flow MFP M575c\", 20140731,\n \"HP LaserJet Enterprise flow M830z Multifunction Printer\", 20140731,\n \"HP LaserJet Enterprise flow MFP M525c\", 20140731,\n \"HP LaserJet Enterprise M4555 MFP\", 20140731,\n \"HP LaserJet Enterprise M4555f MFP\", 20140731,\n \"HP LaserJet Enterprise M4555fskm MFP\", 20140731,\n \"HP LaserJet Enterprise M4555h MFP\", 20140731,\n \"HP LaserJet Enterprise M806dn\", 20140731,\n \"HP LaserJet Enterprise M806x+\", 20140731,\n \"HP LaserJet Enterprise MFP M725dn\", 20140731,\n \"HP LaserJet Enterprise MFP M725z+\", 20140731,\n \"HP LaserJet Enterprise MFP M725z\", 20140731,\n \"HP LaserJet Enterprise MFP M725f\", 20140731,\n \"HP Scanjet Enterprise 8500 fn1 Document Capture Workstation\", 20140731,\n \"HP Color LaserJet CP3525\", 20140722,\n \"HP Color LaserJet CP3525n\", 20140722,\n \"HP Color LaserJet CP3525x\", 20140722,\n \"HP Color LaserJet CP3525dn\", 20140722,\n \"HP LaserJet M4345 Multifunction Printer\", 20140722,\n \"HP LaserJet M4345x Multifunction Printer\", 20140722,\n \"HP LaserJet M4345xm Multifunction Printer\", 20140722,\n \"HP LaserJet M4345xs Multifunction Printer\", 20140722,\n \"HP LaserJet M5025 Multifunction Printer\", 20140722,\n \"HP Color LaserJet CM6040 Multifunction Printer\", 20140723,\n \"HP Color LaserJet CM6040f Multifunction Printer\", 20140723,\n \"HP Color LaserJet Enterprise CP4525n\", 20140725,\n \"HP Color LaserJet Enterprise CP4525dn\", 20140725,\n \"HP Color LaserJet Enterprise CP4525xh\", 20140725,\n \"HP Color LaserJet Enterprise CP4025n Printer\", 20140725,\n \"HP Color LaserJet Enterprise CP4025dn Printer\", 20140725,\n \"HP LaserJet M5035 Multifunction Printer\", 20140722,\n \"HP LaserJet M5035x Multifunction Printer\", 20140722,\n \"HP LaserJet M5035xs Multifunction Printer\", 20140722,\n \"HP LaserJet M9050 Multifunction Printer\", 20140722,\n \"HP LaserJet M9040 Multifunction Printer\", 20140722,\n \"HP Color LaserJet CM4730 Multifunction Printer\", 20140723,\n \"HP Color LaserJet CM4730f Multifunction Printer\", 20140723,\n \"HP Color LaserJet CM4730fsk Multifunction Printer\", 20140723,\n \"HP Color LaserJet CM4730fm Multifunction Printer\", 20140723,\n \"HP LaserJet M3035 Multifunction Printer\", 20140722,\n \"HP LaserJet M3035xs Multifunction Printer\", 20140722,\n \"HP 9250c Digital Sender\", 20140723,\n \"HP LaserJet Enterprise P3015 Printer\", 20140723,\n \"HP LaserJet Enterprise P3015d Printer\", 20140723,\n \"HP LaserJet Enterprise P3015n Printer\", 20140723,\n \"HP LaserJet Enterprise P3015dn Printer\", 20140723,\n \"HP LaserJet Enterprise P3015x Printer\", 20140723,\n \"HP LaserJet M3027 Multifunction Printer\", 20140722,\n \"HP LaserJet M3027x Multifunction Printer\", 20140722,\n \"HP LaserJet CM3530 Multifunction Printer\", 20140722,\n \"HP LaserJet CM3530fs Multifunction Printer\", 20140722,\n \"HP Color LaserJet CP6015dn Printer\", 20140725,\n \"HP Color LaserJet CP6015n Printer\", 20140725,\n \"HP Color LaserJet CP6015x Printer\", 20140725,\n \"HP Color LaserJet CP6015xh Printer\", 20140725,\n \"HP Color LaserJet CP6015de Printer\", 20140725,\n \"HP LaserJet P4515n Printer\", 20140723,\n \"HP LaserJet P4515tn Printer\", 20140723,\n \"HP LaserJet P4515x Printer\", 20140723,\n \"HP LaserJet P4515xm Printer\", 20140723,\n \"HP Color LaserJet CM6030 Multifunction Printer\", 20140723,\n \"HP Color LaserJet CM6030f Multifunction Printer\", 20140723,\n \"HP LaserJet P4015n Printer\", 20140723,\n \"HP LaserJet P4015dn Printer\", 20140723,\n \"HP LaserJet P4015x Printer\", 20140723,\n \"HP LaserJet P4015tn Printer\", 20140723,\n \"HP LaserJet P4014 Printer\", 20140723,\n \"HP LaserJet P4014n Printer\", 20140723,\n \"HP LaserJet P4014dn Printer\", 20140723\n);\n\n# Normalize the names of the models (to make it possible to look them up)\nfixed_signing_firmware = make_array();\nforeach f(keys(signing_firmware))\n{\n fixed_signing_firmware[normalize_model(model:f)] = signing_firmware[f];\n}\nsigning_firmware = fixed_signing_firmware;\n\n# Figure out which firmware update the printer requires\nmodel_norm = normalize_model(model:model);\nupdate = signing_firmware[model_norm];\n\n# If we didn't find it in the list, this plugin doesn't apply\nif (isnull(update)) exit(0, \"This printer model (\" + model + \") does not appear to be affected.\");\n\n# Check if the firmware version is vulnerable\nif (firmware < update)\n{\n if (report_verbosity > 0)\n security_warning(\n port:port,\n extra:\n '\\n Model : ' + model +\n '\\n Serial number : ' + serial +\n '\\n Installed version : ' + firmware +\n '\\n Fixed version : ' + update +\n '\\n'\n );\n else security_warning(port);\n exit(0);\n}\naudit(AUDIT_HOST_NOT, 'affected since firmware version ' + firmware + ' is installed');\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:37:35", "description": "SunOS 5.10: wanboot patch.\nDate this patch was last updated by Sun : Aug/13/17\n\nThis plugin has been deprecated and either replaced with individual 150383 patch-revision plugins, or deemed non-security related.", "cvss3": {}, "published": "2013-06-05T00:00:00", "type": "nessus", "title": "Solaris 10 (sparc) : 150383-19 (deprecated)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2021-01-14T00:00:00", "cpe": ["cpe:/o:sun:solaris"], "id": "SOLARIS10_150383.NASL", "href": "https://www.tenable.com/plugins/nessus/66800", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# @DEPRECATED@\n#\n# Disabled on 2018/03/12. Deprecated and either replaced by\n# individual patch-revision plugins, or has been deemed a\n# non-security advisory.\n#\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(66800);\n script_version(\"1.30\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n\n script_name(english:\"Solaris 10 (sparc) : 150383-19 (deprecated)\");\n script_summary(english:\"Check for patch 150383-19\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"This plugin has been deprecated.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"SunOS 5.10: wanboot patch.\nDate this patch was last updated by Sun : Aug/13/17\n\nThis plugin has been deprecated and either replaced with individual\n150383 patch-revision plugins, or deemed non-security related.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://getupdates.oracle.com/readme/150383-19\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"n/a\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:sun:solaris\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/08/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/06/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Solaris Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Solaris/showrev\");\n\n exit(0);\n}\n\nexit(0, \"This plugin has been deprecated. Consult specific patch-revision plugins for patch 150383 instead.\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:26:16", "description": "The remote Blue Coat ProxySG device's SGOS self-reported version is 6.2 prior to 6.2.15.6. It, therefore, contains a bundled version of OpenSSL that has multiple flaws, meaning it is potentially affected by an unspecified error that could allow an attacker to cause usage of weak keying material leading to simplified man-in-the-middle attacks.", "cvss3": {}, "published": "2014-06-20T00:00:00", "type": "nessus", "title": "Blue Coat ProxySG 6.2.x OpenSSL Security Bypass", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-11-26T00:00:00", "cpe": ["cpe:/o:bluecoat:sgos"], "id": "BLUECOAT_PROXY_SG_6_2_15_6.NASL", "href": "https://www.tenable.com/plugins/nessus/76164", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(76164);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/11/26\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n script_xref(name:\"CERT\", value:\"978508\");\n\n script_name(english:\"Blue Coat ProxySG 6.2.x OpenSSL Security Bypass\");\n script_summary(english:\"Checks the Blue Coat ProxySG SGOS version\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote device is potentially affected by a security bypass\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Blue Coat ProxySG device's SGOS self-reported version is\n6.2 prior to 6.2.15.6. It, therefore, contains a bundled version of\nOpenSSL that has multiple flaws, meaning it is potentially affected by\nan unspecified error that could allow an attacker to cause usage of\nweak keying material leading to simplified man-in-the-middle attacks.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bto.bluecoat.com/security-advisory/sa80\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to version 6.2.15.6 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-0224\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/20\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:bluecoat:sgos\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Firewalls\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"bluecoat_proxy_sg_version.nasl\");\n script_require_keys(\"Host/BlueCoat/ProxySG/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"Host/BlueCoat/ProxySG/Version\");\nui_version = get_kb_item(\"Host/BlueCoat/ProxySG/UI_Version\");\n\nif (version !~ \"^6\\.2\\.\") audit(AUDIT_HOST_NOT, \"Blue Coat ProxySG 6.2.x\");\n\nreport_fix = NULL;\n\n# Select version for report\nif (isnull(ui_version)) report_ver = version;\nelse report_ver = ui_version;\n\nif (version =~ \"^6\\.2\\.\" && ver_compare(ver:version, fix:\"6.2.15.6\", strict:FALSE) == -1)\n{\n fix = '6.2.15.6';\n ui_fix = '6.2.15.6 Build 0';\n\n # Select fixed version for report\n if (isnull(ui_version)) report_fix = fix;\n else report_fix = ui_fix;\n}\n\nif (!isnull(report_fix))\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Installed version : ' + report_ver +\n '\\n Fixed version : ' + report_fix +\n '\\n';\n security_warning(port:0, extra:report);\n }\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_INST_VER_NOT_VULN, 'Blue Coat ProxySG', version);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:27:26", "description": "A version of IBM General Parallel File System (GPFS) 3.5.0.11 or later but prior to 3.5.0.18 is installed on the remote host. It is, therefore, affected by an unspecified error that could allow an attacker to cause usage of weak keying material, leading to simplified man-in-the-middle attacks.", "cvss3": {}, "published": "2014-07-09T00:00:00", "type": "nessus", "title": "IBM General Parallel File System OpenSSL Security Bypass (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-11-26T00:00:00", "cpe": ["cpe:/a:ibm:general_parallel_file_system"], "id": "IBM_GPFS_ISG3T1020948_WINDOWS.NASL", "href": "https://www.tenable.com/plugins/nessus/76428", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(76428);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/11/26\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n script_xref(name:\"CERT\", value:\"978508\");\n\n script_name(english:\"IBM General Parallel File System OpenSSL Security Bypass (Windows)\");\n script_summary(english:\"Checks the local version of GPFS.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A clustered file system on the remote host is affected by a security\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"A version of IBM General Parallel File System (GPFS) 3.5.0.11 or later\nbut prior to 3.5.0.18 is installed on the remote host. It is,\ntherefore, affected by an unspecified error that could allow an\nattacker to cause usage of weak keying material, leading to simplified\nman-in-the-middle attacks.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1020948\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.openssl.org/news/vulnerabilities.html#CVE-2014-0224\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.openssl.org/news/secadv/20140605.txt\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to GPFS 3.5.0.18 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-0224\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/07/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:ibm:general_parallel_file_system\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ibm_gpfs_installed.nbin\");\n script_require_keys(\"SMB/ibm_gpfs/path\", \"SMB/ibm_gpfs/version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\napp_name = \"IBM General Parallel File System\";\nversion = get_kb_item_or_exit(\"SMB/ibm_gpfs/version\");\npath = get_kb_item_or_exit(\"SMB/ibm_gpfs/path\");\n\nif (version !~ \"^(\\d+\\.){3,}\\d+$\") audit(AUDIT_VER_NOT_GRANULAR, app_name, version);\nif (version !~ \"^3\\.5\\.\") audit(AUDIT_NOT_INST, app_name + \" 3.5.x\");\n\nfix = \"3.5.0.18\";\n\n# Affected :\n# 3.5.0.11 >= version < 3.5.0.18\nif (\n ver_compare(ver:version, fix:'3.5.0.11', strict:FALSE) >= 0\n &&\n ver_compare(ver:version, fix:fix, strict:FALSE) == -1\n)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix + '\\n';\n security_warning(extra:report, port:port);\n }\n else security_warning(port:port);\n exit(0);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:03:13", "description": "The remote Cisco device is running a version of IOS XR software that is affected by security bypass vulnerability in the bundled OpenSSL library due to an unspecified error that can allow an attacker to cause the usage of weak keying material, leading to simplified man-in-the-middle attacks.", "cvss3": {}, "published": "2016-02-26T00:00:00", "type": "nessus", "title": "Cisco IOS XR OpenSSL Security Bypass (CSCup22654)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2021-04-08T00:00:00", "cpe": ["cpe:/o:cisco:ios_xr"], "id": "CISCO-SA-20140605-OPENSSL-IOSXR.NASL", "href": "https://www.tenable.com/plugins/nessus/88990", "sourceData": "#TRUSTED 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\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(88990);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/04/08\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n script_xref(name:\"CERT\", value:\"978508\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCup22654\");\n script_xref(name:\"CISCO-SA\", value:\"cisco-sa-20140605-openssl\");\n\n script_name(english:\"Cisco IOS XR OpenSSL Security Bypass (CSCup22654)\");\n script_summary(english:\"Checks the IOS XR version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote device is missing a vendor-supplied security patch.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Cisco device is running a version of IOS XR software that\nis affected by security bypass vulnerability in the bundled OpenSSL\nlibrary due to an unspecified error that can allow an attacker to\ncause the usage of weak keying material, leading to simplified\nman-in-the-middle attacks.\");\n # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl#@ID\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0aa6a7e6\");\n script_set_attribute(attribute:\"see_also\", value:\"https://tools.cisco.com/bugsearch/bug/CSCup22654\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.openssl.org/news/secadv/20140605.txt\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.openssl.org/news/vulnerabilities.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.imperialviolet.org/2014/06/05/earlyccs.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to the relevant fixed version referenced in Cisco bug ID\nCSCup22654.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-0224\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/02/26\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:cisco:ios_xr\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CISCO\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"cisco_ios_xr_version.nasl\");\n script_require_keys(\"Host/Cisco/IOS-XR/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"cisco_func.inc\");\ninclude(\"cisco_kb_cmd_func.inc\");\n\nversion = get_kb_item_or_exit(\"Host/Cisco/IOS-XR/Version\");\noverride = FALSE;\n\n# all releases from 4.3.1 through 5.2.0 are affected\nif (\n !(\n version =~ \"^4\\.3\\.[1-9]\" ||\n version =~ \"^5\\.[01]\\.\" ||\n version =~ \"^5\\.2\\.0($|[^0-9])\"\n )\n) audit(AUDIT_INST_VER_NOT_VULN, 'Cisco IOS XR', version);\n\nport = get_kb_item(\"Host/Cisco/IOS-XR/Port\");\nif(empty_or_null(port))\n port = 0;\n\nif (!isnull(get_kb_item(\"Host/local_checks_enabled\")))\n{\n flag = FALSE;\n buf = cisco_command_kb_item(\n \"Host/Cisco/Config/show_running-config_all\", \"show running-config all\");\n\n # Check for services utilizing SSL/TLS\n if (check_cisco_result(buf))\n {\n override = FALSE;\n\n if (\n # Web UI HTTPS\n preg(string:buf, pattern:\"^http server ssl\", multiline:TRUE) ||\n # XML Agent\n cisco_check_sections(\n config:buf,\n section_regex:\"^xml agent ssl\",\n config_regex:'^\\\\s*no shutdown'\n )\n ) flag++;\n }\n else if (cisco_needs_enable(buf))\n {\n flag = TRUE;\n override = TRUE;\n }\n\n if (!flag)\n audit(AUDIT_HOST_NOT, \"affected because it does not appear as though any service utilizing the OpenSSL library is enabled\");\n\n}\n\nif (report_verbosity > 0)\n{\n report =\n '\\n Cisco bug IDs : CSCup22654' +\n '\\n Installed release : ' + version +\n '\\n Fixed release : 5.3.0' +\n '\\n';\n security_warning(port:port, extra:report+cisco_caveat(override));\n}\nelse security_warning(port:port, extra:cisco_caveat(override));\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:21:37", "description": "From Red Hat Security Advisory 2014:0626 :\n\nUpdated openssl097a and openssl098e packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6 respectively.\n\nThe Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.\n(CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL. For more information about this flaw, refer to: https://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter of this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.", "cvss3": {}, "published": "2014-06-06T00:00:00", "type": "nessus", "title": "Oracle Linux 5 / 6 : openssl097a / openssl098e (ELSA-2014-0626)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:openssl097a", "p-cpe:/a:oracle:linux:openssl098e", "cpe:/o:oracle:linux:5", "cpe:/o:oracle:linux:6"], "id": "ORACLELINUX_ELSA-2014-0626.NASL", "href": "https://www.tenable.com/plugins/nessus/74345", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2014:0626 and \n# Oracle Linux Security Advisory ELSA-2014-0626 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74345);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_xref(name:\"RHSA\", value:\"2014:0626\");\n\n script_name(english:\"Oracle Linux 5 / 6 : openssl097a / openssl098e (ELSA-2014-0626)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2014:0626 :\n\nUpdated openssl097a and openssl098e packages that fix one security\nissue are now available for Red Hat Enterprise Linux 5 and 6\nrespectively.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL\nv2/v3) and Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to\ndecrypt and modify traffic between a client and a server.\n(CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client\nmust be using a vulnerable version of OpenSSL; the server must be\nusing OpenSSL version 1.0.1 and above, and the client must be using\nany version of OpenSSL. For more information about this flaw, refer\nto: https://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this\nissue. Upstream acknowledges KIKUCHI Masashi of Lepidum as the\noriginal reporter of this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. For the update\nto take effect, all services linked to the OpenSSL library (such as\nhttpd and other SSL-enabled services) must be restarted or the system\nrebooted.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-June/004171.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-June/004172.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected openssl097a and / or openssl098e packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:openssl097a\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:openssl098e\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5 / 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"openssl097a-0.9.7a-12.el5_10.1\")) flag++;\n\nif (rpm_check(release:\"EL6\", reference:\"openssl098e-0.9.8e-18.0.1.el6_5.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"openssl097a / openssl098e\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:21:38", "description": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.\n(CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL. For more information about this flaw, refer to :\n\nFor the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.", "cvss3": {}, "published": "2014-06-06T00:00:00", "type": "nessus", "title": "Scientific Linux Security Update : openssl097a and openssl098e on SL5.x, SL6.x i386/x86_64 (20140605)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:openssl097a", "p-cpe:/a:fermilab:scientific_linux:openssl097a-debuginfo", "p-cpe:/a:fermilab:scientific_linux:openssl098e", "p-cpe:/a:fermilab:scientific_linux:openssl098e-debuginfo", "x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20140605_OPENSSL097A_AND_OPENSSL098E_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/74349", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74349);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-0224\");\n\n script_name(english:\"Scientific Linux Security Update : openssl097a and openssl098e on SL5.x, SL6.x i386/x86_64 (20140605)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to\ndecrypt and modify traffic between a client and a server.\n(CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client\nmust be using a vulnerable version of OpenSSL; the server must be\nusing OpenSSL version 1.0.1 and above, and the client must be using\nany version of OpenSSL. For more information about this flaw, refer \nto :\n\nFor the update to take effect, all services linked to the OpenSSL\nlibrary (such as httpd and other SSL-enabled services) must be\nrestarted or the system rebooted.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1406&L=scientific-linux-errata&T=0&P=800\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5d4b1b6d\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:openssl097a\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:openssl097a-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:openssl098e\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:openssl098e-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 6.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"openssl097a-0.9.7a-12.el5_10.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"openssl097a-debuginfo-0.9.7a-12.el5_10.1\")) flag++;\n\nif (rpm_check(release:\"SL6\", reference:\"openssl098e-0.9.8e-18.el6_5.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"openssl098e-debuginfo-0.9.8e-18.el6_5.2\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"openssl097a / openssl097a-debuginfo / openssl098e / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:20:30", "description": "Updated openssl packages that fix one security issue are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.\n(CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL. For more information about this flaw, refer to: https://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter of this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.", "cvss3": {}, "published": "2014-06-06T00:00:00", "type": "nessus", "title": "CentOS 5 : openssl (CESA-2014:0624)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:openssl", "p-cpe:/a:centos:centos:openssl-devel", "p-cpe:/a:centos:centos:openssl-perl", "cpe:/o:centos:centos:5"], "id": "CENTOS_RHSA-2014-0624.NASL", "href": "https://www.tenable.com/plugins/nessus/74333", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:0624 and \n# CentOS Errata and Security Advisory 2014:0624 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74333);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n script_xref(name:\"RHSA\", value:\"2014:0624\");\n\n script_name(english:\"CentOS 5 : openssl (CESA-2014:0624)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated openssl packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL\nv2/v3) and Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to\ndecrypt and modify traffic between a client and a server.\n(CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client\nmust be using a vulnerable version of OpenSSL; the server must be\nusing OpenSSL version 1.0.1 and above, and the client must be using\nany version of OpenSSL. For more information about this flaw, refer\nto: https://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this\nissue. Upstream acknowledges KIKUCHI Masashi of Lepidum as the\noriginal reporter of this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. For the update\nto take effect, all services linked to the OpenSSL library (such as\nhttpd and other SSL-enabled services) must be restarted or the system\nrebooted.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-June/020347.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4762fc5d\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-June/020349.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a15140df\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected openssl packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:X/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-0224\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:openssl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:openssl-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:openssl-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"openssl-0.9.8e-27.el5_10.3\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"openssl-devel-0.9.8e-27.el5_10.3\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"openssl-perl-0.9.8e-27.el5_10.3\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"openssl / openssl-devel / openssl-perl\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:21:18", "description": "From Red Hat Security Advisory 2014:0624 :\n\nUpdated openssl packages that fix one security issue are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.\n(CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL. For more information about this flaw, refer to: https://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter of this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.", "cvss3": {}, "published": "2014-06-06T00:00:00", "type": "nessus", "title": "Oracle Linux 5 : openssl (ELSA-2014-0624)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:openssl", "p-cpe:/a:oracle:linux:openssl-devel", "p-cpe:/a:oracle:linux:openssl-perl", "cpe:/o:oracle:linux:5"], "id": "ORACLELINUX_ELSA-2014-0624.NASL", "href": "https://www.tenable.com/plugins/nessus/74343", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2014:0624 and \n# Oracle Linux Security Advisory ELSA-2014-0624 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74343);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n script_xref(name:\"RHSA\", value:\"2014:0624\");\n\n script_name(english:\"Oracle Linux 5 : openssl (ELSA-2014-0624)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2014:0624 :\n\nUpdated openssl packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL\nv2/v3) and Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to\ndecrypt and modify traffic between a client and a server.\n(CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client\nmust be using a vulnerable version of OpenSSL; the server must be\nusing OpenSSL version 1.0.1 and above, and the client must be using\nany version of OpenSSL. For more information about this flaw, refer\nto: https://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this\nissue. Upstream acknowledges KIKUCHI Masashi of Lepidum as the\noriginal reporter of this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. For the update\nto take effect, all services linked to the OpenSSL library (such as\nhttpd and other SSL-enabled services) must be restarted or the system\nrebooted.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-June/004173.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected openssl packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:X/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:openssl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:openssl-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:openssl-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"openssl-0.9.8e-27.el5_10.3\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"openssl-devel-0.9.8e-27.el5_10.3\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"openssl-perl-0.9.8e-27.el5_10.3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"openssl / openssl-devel / openssl-perl\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:09:05", "description": "The remote Solaris system is missing necessary patches to address security updates :\n\n - OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the 'CCS Injection' vulnerability.\n (CVE-2014-0224)", "cvss3": {}, "published": "2015-01-19T00:00:00", "type": "nessus", "title": "Oracle Solaris Third-Party Patch Update : openssl (cve_2014_0224_cryptographic_issues1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2021-01-14T00:00:00", "cpe": ["cpe:/o:oracle:solaris:11.1", "p-cpe:/a:oracle:solaris:openssl"], "id": "SOLARIS11_OPENSSL_20141014.NASL", "href": "https://www.tenable.com/plugins/nessus/80723", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Oracle Third Party software advisories.\n#\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(80723);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-0224\");\n\n script_name(english:\"Oracle Solaris Third-Party Patch Update : openssl (cve_2014_0224_cryptographic_issues1)\");\n script_summary(english:\"Check for the 'entire' version.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Solaris system is missing a security patch for third-party\nsoftware.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote Solaris system is missing necessary patches to address\nsecurity updates :\n\n - OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1\n before 1.0.1h does not properly restrict processing of\n ChangeCipherSpec messages, which allows\n man-in-the-middle attackers to trigger use of a\n zero-length master key in certain OpenSSL-to-OpenSSL\n communications, and consequently hijack sessions or\n obtain sensitive information, via a crafted TLS\n handshake, aka the 'CCS Injection' vulnerability.\n (CVE-2014-0224)\"\n );\n # https://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4a913f44\"\n );\n # https://blogs.oracle.com/sunsecurity/cve-2014-0224-cryptographic-issues-vulnerability-in-openssl\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4c44d184\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Solaris 11.1.20.5.0.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:solaris:11.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:solaris:openssl\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/01/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Solaris Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Solaris11/release\", \"Host/Solaris11/pkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"solaris.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Solaris11/release\");\nif (isnull(release)) audit(AUDIT_OS_NOT, \"Solaris11\");\npkg_list = solaris_pkg_list_leaves();\nif (isnull (pkg_list)) audit(AUDIT_PACKAGE_LIST_MISSING, \"Solaris pkg-list packages\");\n\nif (empty_or_null(egrep(string:pkg_list, pattern:\"^openssl$\"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, \"openssl\");\n\nflag = 0;\n\nif (solaris_check_release(release:\"0.5.11-0.175.1.20.0.5.0\", sru:\"SRU 11.1.20.5.0\") > 0) flag++;\n\nif (flag)\n{\n error_extra = 'Affected package : openssl\\n' + solaris_get_report2();\n error_extra = ereg_replace(pattern:\"version\", replace:\"OS version\", string:error_extra);\n if (report_verbosity > 0) security_warning(port:0, extra:error_extra);\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_PACKAGE_NOT_AFFECTED, \"openssl\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:40:24", "description": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero- length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the CCS Injection vulnerability.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.", "cvss3": {}, "published": "2022-02-07T00:00:00", "type": "nessus", "title": "Siemens (CVE-2014-0224)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2023-04-27T00:00:00", "cpe": ["cpe:/o:siemens:cp1543-1_firmware", "cpe:/o:siemens:s7-1500_firmware"], "id": "TENABLE_OT_SIEMENS_CVE-2014-0224.NASL", "href": "https://www.tenable.com/plugins/ot/500473", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(500473);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/04/27\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_xref(name:\"HP\", value:\"HPSBMU03055\");\n script_xref(name:\"HP\", value:\"HPSBMU03057\");\n script_xref(name:\"HP\", value:\"HPSBMU03051\");\n script_xref(name:\"HP\", value:\"HPSBGN03068\");\n script_xref(name:\"HP\", value:\"HPSBMU03056\");\n script_xref(name:\"HP\", value:\"HPSBPI03107\");\n script_xref(name:\"HP\", value:\"HPSBMU03058\");\n script_xref(name:\"HP\", value:\"HPSBMU03076\");\n script_xref(name:\"HP\", value:\"HPSBMU03062\");\n script_xref(name:\"SECUNIA\", value:\"59347\");\n script_xref(name:\"FEDORA\", value:\"FEDORA-2014-9308\");\n script_xref(name:\"SECUNIA\", value:\"59191\");\n script_xref(name:\"SECUNIA\", value:\"58579\");\n script_xref(name:\"SECUNIA\", value:\"59438\");\n script_xref(name:\"SECUNIA\", value:\"59301\");\n script_xref(name:\"SECUNIA\", value:\"59721\");\n script_xref(name:\"SECUNIA\", value:\"59491\");\n script_xref(name:\"SECUNIA\", value:\"59450\");\n script_xref(name:\"SECUNIA\", value:\"59655\");\n script_xref(name:\"SECUNIA\", value:\"59659\");\n script_xref(name:\"SECUNIA\", value:\"58639\");\n script_xref(name:\"SECUNIA\", value:\"58759\");\n script_xref(name:\"SECUNIA\", value:\"59043\");\n script_xref(name:\"SECUNIA\", value:\"59666\");\n script_xref(name:\"SECUNIA\", value:\"59126\");\n script_xref(name:\"HP\", value:\"HPSBMU03070\");\n script_xref(name:\"SECUNIA\", value:\"59055\");\n script_xref(name:\"SECUNIA\", value:\"59490\");\n script_xref(name:\"SECUNIA\", value:\"59514\");\n script_xref(name:\"SECUNIA\", value:\"59602\");\n script_xref(name:\"SECUNIA\", value:\"59495\");\n script_xref(name:\"SECUNIA\", value:\"58930\");\n script_xref(name:\"SECUNIA\", value:\"59370\");\n script_xref(name:\"SECUNIA\", value:\"59012\");\n script_xref(name:\"SECUNIA\", value:\"58385\");\n script_xref(name:\"SECUNIA\", value:\"59120\");\n script_xref(name:\"SECUNIA\", value:\"59162\");\n script_xref(name:\"SECUNIA\", value:\"58939\");\n script_xref(name:\"SECUNIA\", value:\"59528\");\n script_xref(name:\"SECUNIA\", value:\"59063\");\n script_xref(name:\"SECUNIA\", value:\"58128\");\n script_xref(name:\"SECUNIA\", value:\"59442\");\n script_xref(name:\"SECUNIA\", value:\"59824\");\n script_xref(name:\"SECUNIA\", value:\"59827\");\n script_xref(name:\"SECUNIA\", value:\"59669\");\n script_xref(name:\"SECUNIA\", value:\"59413\");\n script_xref(name:\"SECUNIA\", value:\"59300\");\n script_xref(name:\"SECUNIA\", value:\"59383\");\n script_xref(name:\"SECUNIA\", value:\"59885\");\n script_xref(name:\"SECUNIA\", value:\"59459\");\n script_xref(name:\"SECUNIA\", value:\"58745\");\n script_xref(name:\"SECUNIA\", value:\"59530\");\n script_xref(name:\"SECUNIA\", value:\"59589\");\n script_xref(name:\"SECUNIA\", value:\"59451\");\n script_xref(name:\"SECUNIA\", value:\"59506\");\n script_xref(name:\"SECUNIA\", value:\"59894\");\n script_xref(name:\"SECUNIA\", value:\"60049\");\n script_xref(name:\"SECUNIA\", value:\"58743\");\n script_xref(name:\"SECUNIA\", value:\"59342\");\n script_xref(name:\"SECUNIA\", value:\"59325\");\n script_xref(name:\"SECUNIA\", value:\"59354\");\n script_xref(name:\"SECUNIA\", value:\"59916\");\n script_xref(name:\"RHSA\", value:\"RHSA-2014:0624\");\n script_xref(name:\"RHSA\", value:\"RHSA-2014:0631\");\n script_xref(name:\"RHSA\", value:\"RHSA-2014:0632\");\n script_xref(name:\"RHSA\", value:\"RHSA-2014:0630\");\n script_xref(name:\"RHSA\", value:\"RHSA-2014:0627\");\n script_xref(name:\"HP\", value:\"HPSBMU03053\");\n script_xref(name:\"RHSA\", value:\"RHSA-2014:0680\");\n script_xref(name:\"RHSA\", value:\"RHSA-2014:0633\");\n script_xref(name:\"RHSA\", value:\"RHSA-2014:0626\");\n script_xref(name:\"SECUNIA\", value:\"60066\");\n script_xref(name:\"SECUNIA\", value:\"59990\");\n script_xref(name:\"SECUNIA\", value:\"60522\");\n script_xref(name:\"SECUNIA\", value:\"60577\");\n script_xref(name:\"SECUNIA\", value:\"59784\");\n script_xref(name:\"SECUNIA\", value:\"59878\");\n script_xref(name:\"SECUNIA\", value:\"60176\");\n script_xref(name:\"SECUNIA\", value:\"60567\");\n script_xref(name:\"SECUNIA\", value:\"60571\");\n script_xref(name:\"SECUNIA\", value:\"60819\");\n script_xref(name:\"HP\", value:\"HPSBST03103\");\n script_xref(name:\"HP\", value:\"HPSBHF03145\");\n script_xref(name:\"HP\", value:\"HPSBST03106\");\n script_xref(name:\"HP\", value:\"HPSBST03097\");\n script_xref(name:\"HP\", value:\"HPSBMU03083\");\n script_xref(name:\"SECUNIA\", value:\"61815\");\n script_xref(name:\"HP\", value:\"HPSBST03265\");\n script_xref(name:\"HP\", value:\"SSRT101818\");\n script_xref(name:\"SuSE\", value:\"openSUSE-SU-2015:0229\");\n script_xref(name:\"SuSE\", value:\"SUSE-SU-2015:0578\");\n script_xref(name:\"HP\", value:\"HPSBST03195\");\n script_xref(name:\"HP\", value:\"HPSBHF03052\");\n script_xref(name:\"HP\", value:\"HPSBMU03065\");\n script_xref(name:\"HP\", value:\"HPSBMU03074\");\n script_xref(name:\"HP\", value:\"HPSBGN03050\");\n script_xref(name:\"HP\", value:\"HPSBST03098\");\n script_xref(name:\"HP\", value:\"HPSBMU03089\");\n script_xref(name:\"HP\", value:\"HPSBMU03101\");\n script_xref(name:\"HP\", value:\"HPSBMU03071\");\n script_xref(name:\"HP\", value:\"HPSBUX03046\");\n script_xref(name:\"HP\", value:\"HPSBMU03094\");\n script_xref(name:\"HP\", value:\"HPSBMU03078\");\n script_xref(name:\"HP\", value:\"HPSBOV03047\");\n script_xref(name:\"HP\", value:\"HPSBHF03088\");\n script_xref(name:\"SuSE\", value:\"openSUSE-SU-2016:0640\");\n script_xref(name:\"SuSE\", value:\"SUSE-SU-2015:0743\");\n script_xref(name:\"GLSA\", value:\"GLSA-201407-05\");\n script_xref(name:\"SECUNIA\", value:\"61254\");\n script_xref(name:\"SECUNIA\", value:\"59677\");\n script_xref(name:\"SECUNIA\", value:\"59661\");\n script_xref(name:\"SECUNIA\", value:\"59529\");\n script_xref(name:\"SECUNIA\", value:\"59525\");\n script_xref(name:\"SECUNIA\", value:\"59518\");\n script_xref(name:\"SECUNIA\", value:\"59502\");\n script_xref(name:\"SECUNIA\", value:\"59483\");\n script_xref(name:\"SECUNIA\", value:\"59460\");\n script_xref(name:\"SECUNIA\", value:\"59454\");\n script_xref(name:\"SECUNIA\", value:\"59449\");\n script_xref(name:\"SECUNIA\", value:\"59448\");\n script_xref(name:\"SECUNIA\", value:\"59447\");\n script_xref(name:\"SECUNIA\", value:\"59446\");\n script_xref(name:\"SECUNIA\", value:\"59445\");\n script_xref(name:\"SECUNIA\", value:\"59444\");\n script_xref(name:\"SECUNIA\", value:\"59441\");\n script_xref(name:\"SECUNIA\", value:\"59440\");\n script_xref(name:\"SECUNIA\", value:\"59437\");\n script_xref(name:\"SECUNIA\", value:\"59435\");\n script_xref(name:\"SECUNIA\", value:\"59429\");\n script_xref(name:\"SECUNIA\", value:\"59389\");\n script_xref(name:\"SECUNIA\", value:\"59380\");\n script_xref(name:\"SECUNIA\", value:\"59375\");\n script_xref(name:\"SECUNIA\", value:\"59374\");\n script_xref(name:\"SECUNIA\", value:\"59368\");\n script_xref(name:\"SECUNIA\", value:\"59365\");\n script_xref(name:\"SECUNIA\", value:\"59364\");\n script_xref(name:\"SECUNIA\", value:\"59362\");\n script_xref(name:\"SECUNIA\", value:\"59338\");\n script_xref(name:\"SECUNIA\", value:\"59310\");\n script_xref(name:\"SECUNIA\", value:\"59306\");\n script_xref(name:\"SECUNIA\", value:\"59305\");\n script_xref(name:\"SECUNIA\", value:\"59287\");\n script_xref(name:\"SECUNIA\", value:\"59284\");\n script_xref(name:\"SECUNIA\", value:\"59282\");\n script_xref(name:\"SECUNIA\", value:\"59264\");\n script_xref(name:\"SECUNIA\", value:\"59231\");\n script_xref(name:\"SECUNIA\", value:\"59223\");\n script_xref(name:\"SECUNIA\", value:\"59215\");\n script_xref(name:\"SECUNIA\", value:\"59214\");\n script_xref(name:\"SECUNIA\", value:\"59211\");\n script_xref(name:\"SECUNIA\", value:\"59202\");\n script_xref(name:\"SECUNIA\", value:\"59192\");\n script_xref(name:\"SECUNIA\", value:\"59190\");\n script_xref(name:\"SECUNIA\", value:\"59189\");\n script_xref(name:\"SECUNIA\", value:\"59188\");\n script_xref(name:\"SECUNIA\", value:\"59186\");\n script_xref(name:\"SECUNIA\", value:\"59175\");\n script_xref(name:\"SECUNIA\", value:\"59167\");\n script_xref(name:\"SECUNIA\", value:\"59163\");\n script_xref(name:\"SECUNIA\", value:\"59142\");\n script_xref(name:\"SECUNIA\", value:\"59135\");\n script_xref(name:\"SECUNIA\", value:\"59132\");\n script_xref(name:\"SECUNIA\", value:\"59101\");\n script_xref(name:\"SECUNIA\", value:\"59093\");\n script_xref(name:\"SECUNIA\", value:\"59040\");\n script_xref(name:\"SECUNIA\", value:\"59004\");\n script_xref(name:\"SECUNIA\", value:\"58977\");\n script_xref(name:\"SECUNIA\", value:\"58945\");\n script_xref(name:\"SECUNIA\", value:\"58742\");\n script_xref(name:\"SECUNIA\", value:\"58719\");\n script_xref(name:\"SECUNIA\", value:\"58716\");\n script_xref(name:\"SECUNIA\", value:\"58714\");\n script_xref(name:\"SECUNIA\", value:\"58713\");\n script_xref(name:\"SECUNIA\", value:\"58667\");\n script_xref(name:\"SECUNIA\", value:\"58660\");\n script_xref(name:\"SECUNIA\", value:\"58615\");\n script_xref(name:\"SECUNIA\", value:\"58492\");\n script_xref(name:\"SECUNIA\", value:\"58433\");\n script_xref(name:\"SECUNIA\", value:\"58337\");\n script_xref(name:\"FEDORA\", value:\"FEDORA-2014-9301\");\n\n script_name(english:\"Siemens (CVE-2014-0224)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote OT asset is affected by a vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h\ndoes not properly restrict processing of ChangeCipherSpec messages,\nwhich allows man-in-the-middle attackers to trigger use of a zero-\nlength master key in certain OpenSSL-to-OpenSSL communications, and\nconsequently hijack sessions or obtain sensitive information, via a\ncrafted TLS handshake, aka the CCS Injection vulnerability.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.openssl.org/news/secadv_20140605.txt\");\n script_set_attribute(attribute:\"see_also\", value:\"http://ccsinjection.lepidum.co.jp\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.kb.cert.org/vuls/id/978508\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1103586\");\n # https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c19c03e5\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.imperialviolet.org/2014/06/05/earlyccs.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/site/blogs/766093/posts/908133\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59191\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58579\");\n script_set_attribute(attribute:\"see_also\", value:\"https://kb.bluecoat.com/index?page=content&id=SA80\");\n # http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5539aa9d\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.kerio.com/support/kerio-control/release-history\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59438\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676035\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59301\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59721\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59491\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59450\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676845\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59655\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21677695\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59659\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58639\");\n # http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d68c75da\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58759\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21678289\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59043\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59666\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59126\");\n # http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?25e3d768\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140499864129699&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21677567\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59055\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59490\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676419\");\n # https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?23273edc\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.novell.com/support/kb/doc.php?id=7015300\");\n # http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?2115f75f\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21673137\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59514\");\n script_set_attribute(attribute:\"see_also\", value:\"http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59602\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59495\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.novell.com/support/kb/doc.php?id=7015264\");\n script_set_attribute(attribute:\"see_also\", value:\"http://esupport.trendmicro.com/solution/en-US/1103813.aspx\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58930\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59370\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59012\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.blackberry.com/btsc/KB36051\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58385\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676655\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59120\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59162\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58939\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59528\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59063\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21677828\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58128\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676062\");\n script_set_attribute(attribute:\"see_also\", value:\"https://kc.mcafee.com/corporate/index?page=content&id=SB10075\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676496\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21678167\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59442\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59824\");\n # http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?2a8d3d74\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21677527\");\n # https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d8f6abfb\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59827\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59669\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59413\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg24037761\");\n # http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6b98b564\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21677390\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59300\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59383\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.splunk.com/view/SP-CAAAM2D\");\n script_set_attribute(attribute:\"see_also\", value:\"https://discussions.nessus.org/thread/7517\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59885\");\n # http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?46b88aa1\");\n # http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7de2f8eb\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59459\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58745\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59530\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59589\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59451\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=isg400001843\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.fortiguard.com/advisory/FG-IR-14-018/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59506\");\n script_set_attribute(attribute:\"see_also\", value:\"https://filezilla-project.org/versions.php?type=server\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=isg400001841\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59894\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/60049\");\n # https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3014ab34\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58743\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59342\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59325\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59354\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59916\");\n script_set_attribute(attribute:\"see_also\", value:\"http://rhn.redhat.com/errata/RHSA-2014-0624.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140386311427810&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://rhn.redhat.com/errata/RHSA-2014-0631.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://rhn.redhat.com/errata/RHSA-2014-0632.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://rhn.redhat.com/errata/RHSA-2014-0630.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://rhn.redhat.com/errata/RHSA-2014-0627.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140369637402535&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://rhn.redhat.com/errata/RHSA-2014-0680.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://rhn.redhat.com/errata/RHSA-2014-0633.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://rhn.redhat.com/errata/RHSA-2014-0626.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/60066\");\n script_set_attribute(attribute:\"see_also\", value:\"http://puppetlabs.com/security/cve/cve-2014-0224\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59990\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/60522\");\n script_set_attribute(attribute:\"see_also\", value:\"http://linux.oracle.com/errata/ELSA-2014-1053.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/60577\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59784\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59878\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/60176\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/60567\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/60571\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/60819\");\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT6443\");\n # http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6dcc7b47\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=141164638606214&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=141383465822787&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=141025641601169&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=141383410222440&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=141147110427269&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140983229106599&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/61815\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securitytracker.com/id/1031032\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.vmware.com/security/advisories/VMSA-2014-0012.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/fulldisclosure/2014/Dec/23\");\n # http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c02f1515\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securitytracker.com/id/1031594\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=142546741516006&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=142350350616251&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html\");\n # http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?acb4a410\");\n # http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c46d757d\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=142805027510172&w=2\");\n # http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?453b5f8c\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=141658880509699&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140448122410568&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140491231331543&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140621259019789&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140482916501310&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140870499402361&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140784085708882&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140852826008699&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140604261522465&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140431828824371&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140266410314613&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140852757108392&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140544599631400&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140389274407904&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140672208601650&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140317760000786&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140904544427729&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140389355508263&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140752315422991&w=2\");\n script_set_attribute(attribute:\"see_also\", value:\"http://marc.info/?l=bugtraq&m=140794476212181&w=2\");\n # https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3818101e\");\n # http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?bac902d5\");\n # http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e6ea11ce\");\n # http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e062d049\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.novell.com/support/kb/doc.php?id=7015271\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.ibm.com/support/docview.wss?uid=ssg1S1004671\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.ibm.com/support/docview.wss?uid=ssg1S1004670\");\n # https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f997f6c0\");\n # http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?957ff7ff\");\n # http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?87b3d108\");\n # http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?eb9f4c47\");\n # http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c603c39c\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg24037870\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg24037732\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg24037731\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg24037730\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg24037729\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg24037727\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21683332\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21678233\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21677836\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21677131\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21677080\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676889\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676879\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676833\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676786\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676644\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676615\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676536\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676529\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676501\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676478\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676334\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676333\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21676071\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21675821\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21675626\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.vmware.com/security/advisories/VMSA-2014-0006.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:106\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:105\");\n # http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?bc543587\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.ibm.com/support/docview.wss?uid=swg24037783\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.ibm.com/support/docview.wss?uid=swg21676877\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.ibm.com/support/docview.wss?uid=swg21676793\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.ibm.com/support/docview.wss?uid=swg21676356\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.ibm.com/support/docview.wss?uid=swg1IT02314\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.ibm.com/support/docview.wss?uid=ssg1S1004678\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.ibm.com/support/docview.wss?uid=isg3T1020948\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.f-secure.com/en/web/labs_global/fsc-2014-6\");\n # http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?91a242c9\");\n script_set_attribute(attribute:\"see_also\", value:\"http://support.citrix.com/article/CTX140876\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gentoo.org/glsa/glsa-201407-05.xml\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/61254\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59677\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59661\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59529\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59525\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59518\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59502\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59483\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59460\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59454\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59449\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59448\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59447\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59446\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59445\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59444\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59441\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59440\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59437\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59435\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59429\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59389\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59380\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59375\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59374\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59368\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59365\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59364\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59362\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59347\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59338\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59310\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59306\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59305\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59287\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59284\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59282\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59264\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59231\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59223\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59215\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59214\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59211\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59202\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59192\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59190\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59189\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59188\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59186\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59175\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59167\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59163\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59142\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59135\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59132\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59101\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59093\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59040\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/59004\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58977\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58945\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58742\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58719\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58716\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58714\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58713\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58667\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58660\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58615\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58492\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58433\");\n script_set_attribute(attribute:\"see_also\", value:\"http://secunia.com/advisories/58337\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/fulldisclosure/2014/Jun/38\");\n # http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f68d352b\");\n # http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c49877be\");\n script_set_attribute(attribute:\"see_also\", value:\"http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217\");\n script_set_attribute(attribute:\"see_also\", value:\"http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195\");\n script_set_attribute(attribute:\"see_also\", value:\"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629\");\n script_set_attribute(attribute:\"see_also\", value:\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc\");\n # http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?76f5def7\");\n # http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1e07fa0e\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securityfocus.com/archive/1/534161/100/0/threaded\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf\");\n # https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?245b0556\");\n script_set_attribute(attribute:\"solution\", value:\n\"Refer to the vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-0224\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(326);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/02/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:siemens:cp1543-1_firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:siemens:s7-1500_firmware\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Tenable.ot\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"tenable_ot_api_integration.nasl\");\n script_require_keys(\"Tenable.ot/Siemens\");\n\n exit(0);\n}\n\n\ninclude('tenable_ot_cve_funcs.inc');\n\nget_kb_item_or_exit('Tenable.ot/Siemens');\n\nvar asset = tenable_ot::assets::get(vendor:'Siemens');\n\nvar vuln_cpes = {\n \"cpe:/o:siemens:cp1543-1_firmware\" :\n {\"versionEndExcluding\" : \"1.1.25\", \"family\" : \"S71500\"},\n \"cpe:/o:siemens:s7-1500_firmware\" :\n {\"versionEndExcluding\" : \"1.6\", \"family\" : \"S71500\"}\n};\n\ntenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:27:17", "description": "The remote Blue Coat ProxySG device's SGOS self-reported version is 4.x and reportedly contains a bundled version of OpenSSL that has multiple flaws. It is, therefore, potentially affected by an unspecified error that could allow an attacker to cause usage of weak keying material, leading to simplified man-in-the-middle attacks.", "cvss3": {}, "published": "2014-06-20T00:00:00", "type": "nessus", "title": "Blue Coat ProxySG 4.x OpenSSL Security Bypass", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-11-26T00:00:00", "cpe": ["cpe:/o:bluecoat:sgos"], "id": "BLUECOAT_PROXY_SG_4_X_OPENSSL.NASL", "href": "https://www.tenable.com/plugins/nessus/76163", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(76163);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/11/26\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n script_xref(name:\"CERT\", value:\"978508\");\n\n script_name(english:\"Blue Coat ProxySG 4.x OpenSSL Security Bypass\");\n script_summary(english:\"Checks the Blue Coat ProxySG SGOS version\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote device is potentially affected by a security bypass\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Blue Coat ProxySG device's SGOS self-reported version is\n4.x and reportedly contains a bundled version of OpenSSL that has\nmultiple flaws. It is, therefore, potentially affected by an\nunspecified error that could allow an attacker to cause usage of weak\nkeying material, leading to simplified man-in-the-middle attacks.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bto.bluecoat.com/security-advisory/sa80\");\n script_set_attribute(attribute:\"solution\", value:\n\"Note that ProxySG 4.0.x, 4.1.x, 4.2.x and 4.3.x will not receive a\npatch for this issue.\n\nPlease contact the vendor for upgrade options.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-0224\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/20\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:bluecoat:sgos\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Firewalls\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"bluecoat_proxy_sg_version.nasl\");\n script_require_keys(\"Host/BlueCoat/ProxySG/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"Host/BlueCoat/ProxySG/Version\");\nui_version = get_kb_item(\"Host/BlueCoat/ProxySG/UI_Version\");\n\nif (version !~ \"^4\\.[0-3]\\.\") audit(AUDIT_HOST_NOT, \"Blue Coat ProxySG 4.0.x / 4.1.x / 4.2.x / 4.3.x\");\n\nreport_fix = NULL;\n\n# Select version for report\nif (isnull(ui_version)) report_ver = version;\nelse report_ver = ui_version;\n\nif (version =~ \"^4\\.[0-3]\\.\")\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Installed version : ' + report_ver +\n '\\n Fixed version : Please contact the vendor for upgrade options.' +\n '\\n';\n security_warning(port:0, extra:report);\n }\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_INST_VER_NOT_VULN, 'Blue Coat ProxySG', version);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:27:16", "description": "The remote device is running a software version known to be affected by an OpenSSL related vulnerability. The flaw could allow a MiTM attacker to decrypt or forge SSL messages by telling the service to begin encrypted communications before key material has been exchanged, which causes predictable keys to be used to secure future traffic.", "cvss3": {}, "published": "2014-06-18T00:00:00", "type": "nessus", "title": "Cisco ACE30 and ACE4710 OpenSSL 'ChangeCipherSpec' MiTM Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2019-11-26T00:00:00", "cpe": ["cpe:/a:cisco:application_control_engine_software"], "id": "CISCO-CSCUP22544-ACE.NASL", "href": "https://www.tenable.com/plugins/nessus/76127", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(76127);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/26\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n script_xref(name:\"CERT\", value:\"978508\");\n\n script_name(english:\"Cisco ACE30 and ACE4710 OpenSSL 'ChangeCipherSpec' MiTM Vulnerability\");\n script_summary(english:\"Checks device version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by a man-in-the-middle vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote device is running a software version known to be affected\nby an OpenSSL related vulnerability. The flaw could allow a MiTM\nattacker to decrypt or forge SSL messages by telling the service to\nbegin encrypted communications before key material has been exchanged,\nwhich causes predictable keys to be used to secure future traffic.\");\n # http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5539aa9d\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.openssl.org/news/secadv/20140605.txt\");\n script_set_attribute(attribute:\"solution\", value:\n\"There is currently no known solution.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:U/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-0224\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:cisco:application_control_engine_software\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CISCO\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"cisco_ace_version.nasl\");\n script_require_keys(\"Host/Cisco/ACE/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\n\nversion = get_kb_item(\"Host/Cisco/ACE/Version\");\nif (isnull(version)) audit(AUDIT_NOT_INST, 'Cisco ACE');\n\nif (\n version =~ \"^A4\\(([01]\\..+|2\\.[0-3][^\\d]*)\\)\" ||\n version =~ \"^A5\\(([012]\\..+|3\\.0[^\\d]*)\\)\"\n)\n{\n if (report_verbosity > 0)\n {\n report = '\\n Installed version : ' + version +\n '\\n';\n security_warning(port:0, extra:report);\n }\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_INST_VER_NOT_VULN, \"Cisco ACE\", version);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:25:11", "description": "Updated openssl packages that fix one security issue are now available for Red Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise Linux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support, Red Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat Enterprise Linux 6.3 and 6.4 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.\n(CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL. For more information about this flaw, refer to: https://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter of this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.", "cvss3": {}, "published": "2014-11-08T00:00:00", "type": "nessus", "title": "RHEL 4 / 5 / 6 : openssl (RHSA-2014:0627)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-0224"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:openssl", "p-cpe:/a:redhat:enterprise_linux:openssl-debuginfo", "p-cpe:/a:redhat:enterprise_linux:openssl-devel", "p-cpe:/a:redhat:enterprise_linux:openssl-perl", "p-cpe:/a:redhat:enterprise_linux:openssl-static", "cpe:/o:redhat:enterprise_linux:4", "cpe:/o:redhat:enterprise_linux:5.6", "cpe:/o:redhat:enterprise_linux:5.9", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:6.2", "cpe:/o:redhat:enterprise_linux:6.3", "cpe:/o:redhat:enterprise_linux:6.4"], "id": "REDHAT-RHSA-2014-0627.NASL", "href": "https://www.tenable.com/plugins/nessus/79025", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:0627. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79025);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-0224\");\n script_bugtraq_id(67899);\n script_xref(name:\"RHSA\", value:\"2014:0627\");\n\n script_name(english:\"RHEL 4 / 5 / 6 : openssl (RHSA-2014:0627)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated openssl packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat\nEnterprise Linux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended\nUpdate Support, Red Hat Enterprise Linux 6.2 Advanced Update Support,\nand Red Hat Enterprise Linux 6.3 and 6.4 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL\nv2/v3) and Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to\ndecrypt and modify traffic between a client and a server.\n(CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client\nmust be using a vulnerable version of OpenSSL; the server must be\nusing OpenSSL version 1.0.1 and above, and the client must be using\nany version of OpenSSL. For more information about this flaw, refer\nto: https://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this\nissue. Upstream acknowledges KIKUCHI Masashi of Lepidum as the\noriginal reporter of this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. For the update\nto take effect, all services linked to the OpenSSL library (such as\nhttpd and other SSL-enabled services) must be restarted or the system\nrebooted.\"\n );\n # https://access.redhat.com/site/articles/904433\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/articles/904433\"\n );\n # https://access.redhat.com/site/solutions/905793\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/905793\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2014:0627\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-0224\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:X/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openssl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openssl-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openssl-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openssl-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:openssl-static\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.9\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/08\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5\\.6|5\\.9|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x / 5.6 / 5.9 / 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2014:0627\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{ sp = get_kb_item(\"Host/RedHat/minor_release\");\n if (isnull(sp)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\n\n flag = 0;\n