The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
Name | URL | Source | Tags |
---|---|---|---|
http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96db9023b881d7cd9f379b0c154650d6c108e9a3 | http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96db9023b881d7cd9f379b0c154650d6c108e9a3 | CONFIRM | Patch, Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1084875 | https://bugzilla.redhat.com/show_bug.cgi?id=1084875 | CONFIRM | Issue Tracking, Third Party Advisory |
http://www.openssl.org/news/secadv_20140407.txt | http://www.openssl.org/news/secadv_20140407.txt | CONFIRM | Vendor Advisory |
http://heartbleed.com/ | http://heartbleed.com/ | MISC | Third Party Advisory |
1030078 | http://www.securitytracker.com/id/1030078 | SECTRACK | Third Party Advisory, VDB Entry |
20140409 Re: heartbleed OpenSSL bug CVE-2014-0160 | http://seclists.org/fulldisclosure/2014/Apr/109 | FULLDISC | Mailing List, Third Party Advisory |
20140412 Re: heartbleed OpenSSL bug CVE-2014-0160 | http://seclists.org/fulldisclosure/2014/Apr/190 | FULLDISC | Mailing List, Third Party Advisory |
[syslog-ng-announce] 20140411 syslog-ng Premium Edition 5 LTS (5.0.4a) has been released | https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html | MLIST | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html | http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html | CONFIRM | Third Party Advisory |
RHSA-2014:0376 | http://rhn.redhat.com/errata/RHSA-2014-0376.html | REDHAT | Third Party Advisory |
RHSA-2014:0396 | http://rhn.redhat.com/errata/RHSA-2014-0396.html | REDHAT | Third Party Advisory |
1030082 | http://www.securitytracker.com/id/1030082 | SECTRACK | Third Party Advisory, VDB Entry |
57347 | http://secunia.com/advisories/57347 | SECUNIA | Third Party Advisory |
HPSBMU02995 | http://marc.info/?l=bugtraq&m=139722163017074&w=2 | HP | Third Party Advisory |
1030077 | http://www.securitytracker.com/id/1030077 | SECTRACK | Third Party Advisory, VDB Entry |
http://www-01.ibm.com/support/docview.wss?uid=swg21670161 | http://www-01.ibm.com/support/docview.wss?uid=swg21670161 | CONFIRM | Broken Link |
DSA-2896 | http://www.debian.org/security/2014/dsa-2896 | DEBIAN | Third Party Advisory |
RHSA-2014:0377 | http://rhn.redhat.com/errata/RHSA-2014-0377.html | REDHAT | Third Party Advisory |
1030080 | http://www.securitytracker.com/id/1030080 | SECTRACK | Third Party Advisory, VDB Entry |
FEDORA-2014-4879 | http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html | FEDORA | Third Party Advisory |
1030074 | http://www.securitytracker.com/id/1030074 | SECTRACK | Third Party Advisory, VDB Entry |
20140408 heartbleed OpenSSL bug CVE-2014-0160 | http://seclists.org/fulldisclosure/2014/Apr/90 | FULLDISC | Mailing List, Third Party Advisory |
1030081 | http://www.securitytracker.com/id/1030081 | SECTRACK | Third Party Advisory, VDB Entry |
20140409 OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed | CISCO | Third Party Advisory |
RHSA-2014:0378 | http://rhn.redhat.com/errata/RHSA-2014-0378.html | REDHAT | Third Party Advisory |
20140408 Re: heartbleed OpenSSL bug CVE-2014-0160 | http://seclists.org/fulldisclosure/2014/Apr/91 | FULLDISC | Mailing List, Third Party Advisory |
57483 | http://secunia.com/advisories/57483 | SECUNIA | Third Party Advisory |
http://www.splunk.com/view/SP-CAAAMB3 | http://www.splunk.com/view/SP-CAAAMB3 | CONFIRM | Third Party Advisory |
FEDORA-2014-4910 | http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html | FEDORA | Third Party Advisory |
1030079 | http://www.securitytracker.com/id/1030079 | SECTRACK | Third Party Advisory, VDB Entry |
openSUSE-SU-2014:0492 | http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html | SUSE | Mailing List, Third Party Advisory |
57721 | http://secunia.com/advisories/57721 | SECUNIA | Third Party Advisory |
http://www.blackberry.com/btsc/KB35882 | http://www.blackberry.com/btsc/KB35882 | CONFIRM | Broken Link |
1030026 | http://www.securitytracker.com/id/1030026 | SECTRACK | Third Party Advisory, VDB Entry |
SUSE-SA:2014:002 | http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html | SUSE | Mailing List, Third Party Advisory |
66690 | http://www.securityfocus.com/bid/66690 | BID | Third Party Advisory, VDB Entry |
http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ | http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ | CONFIRM | Third Party Advisory |
TA14-098A | http://www.us-cert.gov/ncas/alerts/TA14-098A | CERT | Third Party Advisory, US Government Resource |
http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ | http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ | CONFIRM | Third Party Advisory |
http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/ | http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/ | MISC | Third Party Advisory |
https://blog.torproject.org/blog/openssl-bug-cve-2014-0160 | https://blog.torproject.org/blog/openssl-bug-cve-2014-0160 | MISC | Third Party Advisory |
57966 | http://secunia.com/advisories/57966 | SECUNIA | Third Party Advisory |
http://www.f-secure.com/en/web/labs_global/fsc-2014-1 | http://www.f-secure.com/en/web/labs_global/fsc-2014-1 | CONFIRM | Third Party Advisory |
20140411 MRI Rubies may contain statically linked, vulnerable OpenSSL | http://seclists.org/fulldisclosure/2014/Apr/173 | FULLDISC | Mailing List, Third Party Advisory |
http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ | http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ | CONFIRM | Third Party Advisory |
57968 | http://secunia.com/advisories/57968 | SECUNIA | Third Party Advisory |
https://code.google.com/p/mod-spdy/issues/detail?id=85 | https://code.google.com/p/mod-spdy/issues/detail?id=85 | CONFIRM | Third Party Advisory |
32745 | http://www.exploit-db.com/exploits/32745 | EXPLOIT-DB | Exploit, Third Party Advisory, VDB Entry |
VU#720951 | http://www.kb.cert.org/vuls/id/720951 | CERT-VN | Third Party Advisory, US Government Resource |
https://www.cert.fi/en/reports/2014/vulnerability788210.html | https://www.cert.fi/en/reports/2014/vulnerability788210.html | MISC | Third Party Advisory |
32764 | http://www.exploit-db.com/exploits/32764 | EXPLOIT-DB | Exploit, Third Party Advisory, VDB Entry |
57836 | http://secunia.com/advisories/57836 | SECUNIA | Third Party Advisory |
https://gist.github.com/chapmajs/10473815 | https://gist.github.com/chapmajs/10473815 | MISC | Third Party Advisory |
http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/ | http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/ | CONFIRM | Third Party Advisory |
http://cogentdatahub.com/ReleaseNotes.html | http://cogentdatahub.com/ReleaseNotes.html | CONFIRM | Release Notes, Third Party Advisory |
HPSBMU03009 | http://marc.info/?l=bugtraq&m=139905458328378&w=2 | HP | Third Party Advisory |
HPSBMU03022 | http://marc.info/?l=bugtraq&m=139869891830365&w=2 | HP | Third Party Advisory |
HPSBMU03024 | http://marc.info/?l=bugtraq&m=139889113431619&w=2 | HP | Third Party Advisory |
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1 | http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1 | CONFIRM | Third Party Advisory |
http://www.kerio.com/support/kerio-control/release-history | http://www.kerio.com/support/kerio-control/release-history | CONFIRM | Third Party Advisory |
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3 | http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3 | CONFIRM | Third Party Advisory |
http://advisories.mageia.org/MGASA-2014-0165.html | http://advisories.mageia.org/MGASA-2014-0165.html | CONFIRM | Third Party Advisory |
HPSBST03000 | https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken | HP | Broken Link |
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html | http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html | CONFIRM | Third Party Advisory |
http://www-01.ibm.com/support/docview.wss?uid=isg400001843 | http://www-01.ibm.com/support/docview.wss?uid=isg400001843 | CONFIRM | Third Party Advisory |
https://filezilla-project.org/versions.php?type=server | https://filezilla-project.org/versions.php?type=server | CONFIRM | Release Notes, Third Party Advisory |
http://www-01.ibm.com/support/docview.wss?uid=isg400001841 | http://www-01.ibm.com/support/docview.wss?uid=isg400001841 | CONFIRM | Third Party Advisory |
https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217 | https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217 | CONFIRM | Third Party Advisory |
HPSBHF03136 | http://marc.info/?l=bugtraq&m=141287864628122&w=2 | HP | Third Party Advisory |
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities | http://seclists.org/fulldisclosure/2014/Dec/23 | FULLDISC | Mailing List, Third Party Advisory |
http://www.vmware.com/security/advisories/VMSA-2014-0012.html | http://www.vmware.com/security/advisories/VMSA-2014-0012.html | CONFIRM | Not Applicable |
SSRT101846 | http://marc.info/?l=bugtraq&m=142660345230545&w=2 | HP | Third Party Advisory |
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 | http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 | CONFIRM | Not Applicable |
MDVSA-2015:062 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 | MANDRIVA | Third Party Advisory |
HPSBMU03017 | http://marc.info/?l=bugtraq&m=139817727317190&w=2 | HP | Third Party Advisory |
HPSBMU02994 | http://marc.info/?l=bugtraq&m=139757726426985&w=2 | HP | Third Party Advisory |
HPSBST03001 | http://marc.info/?l=bugtraq&m=139758572430452&w=2 | HP | Third Party Advisory |
HPSBST03004 | http://marc.info/?l=bugtraq&m=139905653828999&w=2 | HP | Third Party Advisory |
HPSBST03016 | http://marc.info/?l=bugtraq&m=139842151128341&w=2 | HP | Third Party Advisory |
HPSBMU03032 | http://marc.info/?l=bugtraq&m=139905405728262&w=2 | HP | Third Party Advisory |
HPSBGN03011 | http://marc.info/?l=bugtraq&m=139833395230364&w=2 | HP | Third Party Advisory |
HPSBMU03013 | http://marc.info/?l=bugtraq&m=139824993005633&w=2 | HP | Third Party Advisory |
HPSBMU03023 | http://marc.info/?l=bugtraq&m=139843768401936&w=2 | HP | Third Party Advisory |
HPSBMU03029 | http://marc.info/?l=bugtraq&m=139905202427693&w=2 | HP | Third Party Advisory |
HPSBGN03008 | http://marc.info/?l=bugtraq&m=139774054614965&w=2 | HP | Third Party Advisory |
HPSBPI03031 | http://marc.info/?l=bugtraq&m=139889295732144&w=2 | HP | Third Party Advisory |
HPSBHF03021 | http://marc.info/?l=bugtraq&m=139835815211508&w=2 | HP | Third Party Advisory |
HPSBMU03037 | http://marc.info/?l=bugtraq&m=140724451518351&w=2 | HP | Third Party Advisory |
HPSBMU03012 | http://marc.info/?l=bugtraq&m=139808058921905&w=2 | HP | Third Party Advisory |
HPSBMU03020 | http://marc.info/?l=bugtraq&m=139836085512508&w=2 | HP | Third Party Advisory |
HPSBMU03025 | http://marc.info/?l=bugtraq&m=139869720529462&w=2 | HP | Third Party Advisory |
HPSBST03027 | http://marc.info/?l=bugtraq&m=139905868529690&w=2 | HP | Third Party Advisory |
HPSBMU02999 | http://marc.info/?l=bugtraq&m=139765756720506&w=2 | HP | Third Party Advisory |
HPSBMU03040 | http://marc.info/?l=bugtraq&m=140015787404650&w=2 | HP | Third Party Advisory |
HPSBST03015 | http://marc.info/?l=bugtraq&m=139824923705461&w=2 | HP | Third Party Advisory |
HPSBMU02997 | http://marc.info/?l=bugtraq&m=139757919027752&w=2 | HP | Third Party Advisory |
HPSBGN03010 | http://marc.info/?l=bugtraq&m=139774703817488&w=2 | HP | Third Party Advisory |
HPSBMU03028 | http://marc.info/?l=bugtraq&m=139905243827825&w=2 | HP | Third Party Advisory |
HPSBMU03044 | http://marc.info/?l=bugtraq&m=140075368411126&w=2 | HP | Third Party Advisory |
HPSBMU03033 | http://marc.info/?l=bugtraq&m=139905295427946&w=2 | HP | Third Party Advisory |
HPSBPI03014 | http://marc.info/?l=bugtraq&m=139835844111589&w=2 | HP | Third Party Advisory |
HPSBMU02998 | http://marc.info/?l=bugtraq&m=139757819327350&w=2 | HP | Third Party Advisory |
HPSBMU03019 | http://marc.info/?l=bugtraq&m=139817685517037&w=2 | HP | Third Party Advisory |
HPSBMU03030 | http://marc.info/?l=bugtraq&m=139905351928096&w=2 | HP | Third Party Advisory |
HPSBMU03018 | http://marc.info/?l=bugtraq&m=139817782017443&w=2 | HP | Third Party Advisory |
HPSBMU03062 | http://marc.info/?l=bugtraq&m=140752315422991&w=2 | HP | Third Party Advisory |
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00 | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00 | CONFIRM | Third Party Advisory |
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661 | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661 | CONFIRM | Third Party Advisory |
http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf | http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf | CONFIRM | Not Applicable |
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf | http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf | CONFIRM | Third Party Advisory |
59347 | http://secunia.com/advisories/59347 | SECUNIA | Third Party Advisory |
59243 | http://secunia.com/advisories/59243 | SECUNIA | Third Party Advisory |
59139 | http://secunia.com/advisories/59139 | SECUNIA | Third Party Advisory |
FEDORA-2014-9308 | http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html | FEDORA | Mailing List, Third Party Advisory |
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01 | http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01 | CONFIRM | Broken Link |
https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html | https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html | CONFIRM | Third Party Advisory |
http://support.citrix.com/article/CTX140605 | http://support.citrix.com/article/CTX140605 | CONFIRM | Third Party Advisory |
USN-2165-1 | http://www.ubuntu.com/usn/USN-2165-1 | UBUNTU | Third Party Advisory |
openSUSE-SU-2014:0560 | http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html | SUSE | Mailing List, Third Party Advisory |
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities | http://www.securityfocus.com/archive/1/534161/100/0/threaded | BUGTRAQ | Not Applicable, Third Party Advisory, VDB Entry |
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008 | https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008 | CONFIRM | Third Party Advisory |
[tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ | https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@%3Cdev.tomcat.apache.org%3E | MLIST | Mailing List, Patch, Third Party Advisory |
[tomcat-dev] 20190325 svn commit: r1856174 [26/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ | https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@%3Cdev.tomcat.apache.org%3E | MLIST | Mailing List, Patch, Third Party Advisory |
https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html | https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html | MISC | Exploit, Third Party Advisory |
[tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/ | https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@%3Cdev.tomcat.apache.org%3E | MLIST | Mailing List, Patch, Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf | https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf | CONFIRM | Third Party Advisory |
[tomcat-dev] 20200213 svn commit: r1873980 [31/34] - /tomcat/site/trunk/docs/ | https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@%3Cdev.tomcat.apache.org%3E | MLIST | Mailing List, Patch, Third Party Advisory |
https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd | https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd | MISC | Exploit, Third Party Advisory |