Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 CVE-2014-3511 CVE-2014-3512 CVE-2014-5139 |
CWE-ID | CWE-20 CWE-399 CWE-401 CWE-200 CWE-362 CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
OpenSSL Server applications / Encryption software |
Vendor | OpenSSL Software Foundation |
Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU41407
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2014-3505
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
MitigationInstall update from vendor's website.
Vulnerable software versionsOpenSSL: 0.9.8y - 1.0.1
CPE2.3https:httpftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
https://linux.oracle.com/errata/ELSA-2014-1052.html
https://linux.oracle.com/errata/ELSA-2014-1053.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
https://marc.info/?l=bugtraq&m=140853041709441&w=2
https://marc.info/?l=bugtraq&m=141077370928502&w=2
https://marc.info/?l=bugtraq&m=142660345230545&w=2
https://rhn.redhat.com/errata/RHSA-2014-1256.html
https://rhn.redhat.com/errata/RHSA-2014-1297.html
https://secunia.com/advisories/58962
https://secunia.com/advisories/59221
https://secunia.com/advisories/59700
https://secunia.com/advisories/59710
https://secunia.com/advisories/59743
https://secunia.com/advisories/59756
https://secunia.com/advisories/60022
https://secunia.com/advisories/60221
https://secunia.com/advisories/60493
https://secunia.com/advisories/60684
https://secunia.com/advisories/60687
https://secunia.com/advisories/60778
https://secunia.com/advisories/60803
https://secunia.com/advisories/60824
https://secunia.com/advisories/60917
https://secunia.com/advisories/60921
https://secunia.com/advisories/60938
https://secunia.com/advisories/61040
https://secunia.com/advisories/61100
https://secunia.com/advisories/61184
https://secunia.com/advisories/61250
https://secunia.com/advisories/61775
https://secunia.com/advisories/61959
https://security.gentoo.org/glsa/glsa-201412-39.xml
https://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html
https://www.debian.org/security/2014/dsa-2998
https://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
https://www.mandriva.com/security/advisories?name=MDVSA-2014:158
https://www.securityfocus.com/bid/69081
https://www.securitytracker.com/id/1030693
https://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
https://www-01.ibm.com/support/docview.wss?uid=swg21682293
https://www-01.ibm.com/support/docview.wss?uid=swg21683389
https://www-01.ibm.com/support/docview.wss?uid=swg21686997
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bff1ce4e6a1c57c3d0a5f9e4f85ba6385fccfe8b
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
https://www.openssl.org/news/secadv_20140806.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41408
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2014-3506
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.
MitigationInstall update from vendor's website.
Vulnerable software versionsOpenSSL: 0.9.8y - 1.0.1
CPE2.3https:ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
https://linux.oracle.com/errata/ELSA-2014-1052.html
https://linux.oracle.com/errata/ELSA-2014-1053.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
https://marc.info/?l=bugtraq&m=140853041709441&w=2
https://marc.info/?l=bugtraq&m=141077370928502&w=2
https://marc.info/?l=bugtraq&m=142660345230545&w=2
https://rhn.redhat.com/errata/RHSA-2014-1256.html
https://rhn.redhat.com/errata/RHSA-2014-1297.html
https://secunia.com/advisories/58962
https://secunia.com/advisories/59221
https://secunia.com/advisories/59700
https://secunia.com/advisories/59710
https://secunia.com/advisories/59743
https://secunia.com/advisories/59756
https://secunia.com/advisories/60022
https://secunia.com/advisories/60221
https://secunia.com/advisories/60493
https://secunia.com/advisories/60684
https://secunia.com/advisories/60687
https://secunia.com/advisories/60778
https://secunia.com/advisories/60803
https://secunia.com/advisories/60824
https://secunia.com/advisories/60917
https://secunia.com/advisories/60921
https://secunia.com/advisories/60938
https://secunia.com/advisories/61017
https://secunia.com/advisories/61040
https://secunia.com/advisories/61100
https://secunia.com/advisories/61184
https://secunia.com/advisories/61250
https://secunia.com/advisories/61775
https://secunia.com/advisories/61959
https://security.gentoo.org/glsa/glsa-201412-39.xml
https://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html
https://www.debian.org/security/2014/dsa-2998
https://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
https://www.mandriva.com/security/advisories?name=MDVSA-2014:158
https://www.securityfocus.com/bid/69076
https://www.securitytracker.com/id/1030693
https://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
https://www-01.ibm.com/support/docview.wss?uid=swg21682293
https://www-01.ibm.com/support/docview.wss?uid=swg21683389
https://www-01.ibm.com/support/docview.wss?uid=swg21686997
https://bugzilla.redhat.com/show_bug.cgi?id=1127500
https://exchange.xforce.ibmcloud.com/vulnerabilities/95160
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1250f12613b61758675848f6600ebd914ccd7636
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
https://www.openssl.org/news/secadv_20140806.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41409
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2014-3507
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function. A remote attacker can perform a denial of service attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsOpenSSL: 0.9.8y - 1.0.1
CPE2.3https:httpftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
https://linux.oracle.com/errata/ELSA-2014-1052.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
https://marc.info/?l=bugtraq&m=140853041709441&w=2
https://marc.info/?l=bugtraq&m=141077370928502&w=2
https://marc.info/?l=bugtraq&m=142660345230545&w=2
https://secunia.com/advisories/58962
https://secunia.com/advisories/59700
https://secunia.com/advisories/59710
https://secunia.com/advisories/59743
https://secunia.com/advisories/59756
https://secunia.com/advisories/60022
https://secunia.com/advisories/60221
https://secunia.com/advisories/60493
https://secunia.com/advisories/60684
https://secunia.com/advisories/60778
https://secunia.com/advisories/60803
https://secunia.com/advisories/60824
https://secunia.com/advisories/60917
https://secunia.com/advisories/60921
https://secunia.com/advisories/60938
https://secunia.com/advisories/61017
https://secunia.com/advisories/61040
https://secunia.com/advisories/61100
https://secunia.com/advisories/61184
https://secunia.com/advisories/61250
https://secunia.com/advisories/61775
https://secunia.com/advisories/61959
https://security.gentoo.org/glsa/glsa-201412-39.xml
https://support.f5.com/kb/en-us/solutions/public/15000/500/sol15573.html
https://www.debian.org/security/2014/dsa-2998
https://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
https://www.mandriva.com/security/advisories?name=MDVSA-2014:158
https://www.securityfocus.com/bid/69078
https://www.securitytracker.com/id/1030693
https://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
https://www-01.ibm.com/support/docview.wss?uid=swg21682293
https://www-01.ibm.com/support/docview.wss?uid=swg21683389
https://www-01.ibm.com/support/docview.wss?uid=swg21686997
https://bugzilla.redhat.com/show_bug.cgi?id=1127502
https://exchange.xforce.ibmcloud.com/vulnerabilities/95161
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d0a4b7d1a2948fce38515b8d862f43e7ba0ebf74
https://kc.mcafee.com/corporate/index?page=content&id=SB10109
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
https://www.openssl.org/news/secadv_20140806.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41410
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2014-3508
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.
MitigationInstall update from vendor's website.
Vulnerable software versionsOpenSSL: 0.9.8y - 1.0.1
CPE2.3https:ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
https://linux.oracle.com/errata/ELSA-2014-1052.html
https://linux.oracle.com/errata/ELSA-2014-1053.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
https://marc.info/?l=bugtraq&m=140853041709441&w=2
https://marc.info/?l=bugtraq&m=140973896703549&w=2
https://marc.info/?l=bugtraq&m=141077370928502&w=2
https://marc.info/?l=bugtraq&m=142495837901899&w=2
https://marc.info/?l=bugtraq&m=142624590206005&w=2
https://marc.info/?l=bugtraq&m=142660345230545&w=2
https://marc.info/?l=bugtraq&m=142791032306609&w=2
https://marc.info/?l=bugtraq&m=143290437727362&w=2
https://marc.info/?l=bugtraq&m=143290522027658&w=2
https://rhn.redhat.com/errata/RHSA-2014-1256.html
https://rhn.redhat.com/errata/RHSA-2014-1297.html
https://secunia.com/advisories/58962
https://secunia.com/advisories/59221
https://secunia.com/advisories/59700
https://secunia.com/advisories/59710
https://secunia.com/advisories/59743
https://secunia.com/advisories/59756
https://secunia.com/advisories/60022
https://secunia.com/advisories/60221
https://secunia.com/advisories/60410
https://secunia.com/advisories/60493
https://secunia.com/advisories/60684
https://secunia.com/advisories/60687
https://secunia.com/advisories/60778
https://secunia.com/advisories/60803
https://secunia.com/advisories/60824
https://secunia.com/advisories/60861
https://secunia.com/advisories/60917
https://secunia.com/advisories/60921
https://secunia.com/advisories/60938
https://secunia.com/advisories/61017
https://secunia.com/advisories/61100
https://secunia.com/advisories/61171
https://secunia.com/advisories/61184
https://secunia.com/advisories/61214
https://secunia.com/advisories/61250
https://secunia.com/advisories/61392
https://secunia.com/advisories/61775
https://secunia.com/advisories/61959
https://support.f5.com/kb/en-us/solutions/public/15000/500/sol15571.html
https://www.debian.org/security/2014/dsa-2998
https://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
https://www.mandriva.com/security/advisories?name=MDVSA-2014:158
https://www.securityfocus.com/bid/69075
https://www.securitytracker.com/id/1030693
https://www.tenable.com/security/tns-2014-06
https://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
https://www-01.ibm.com/support/docview.wss?uid=swg21681752
https://www-01.ibm.com/support/docview.wss?uid=swg21682293
https://www-01.ibm.com/support/docview.wss?uid=swg21683389
https://www-01.ibm.com/support/docview.wss?uid=swg21686997
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3508_information_disclosure
https://bugzilla.redhat.com/show_bug.cgi?id=1127490
https://exchange.xforce.ibmcloud.com/vulnerabilities/95165
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=0042fb5fd1c9d257d713b15a1f45da05cf5c1c87
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
https://support.citrix.com/article/CTX216642
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
https://www.openssl.org/news/secadv_20140806.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41411
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2014-3509
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.
MitigationInstall update from vendor's website.
Vulnerable software versionsOpenSSL: 1.0.0k - 1.0.1
CPE2.3https:ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
https://linux.oracle.com/errata/ELSA-2014-1052.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
https://marc.info/?l=bugtraq&m=142350350616251&w=2
https://marc.info/?l=bugtraq&m=142495837901899&w=2
https://marc.info/?l=bugtraq&m=142624590206005&w=2
https://marc.info/?l=bugtraq&m=142660345230545&w=2
https://marc.info/?l=bugtraq&m=142791032306609&w=2
https://marc.info/?l=bugtraq&m=143290437727362&w=2
https://marc.info/?l=bugtraq&m=143290522027658&w=2
https://rhn.redhat.com/errata/RHSA-2015-0197.html
https://secunia.com/advisories/58962
https://secunia.com/advisories/59700
https://secunia.com/advisories/59710
https://secunia.com/advisories/59756
https://secunia.com/advisories/60022
https://secunia.com/advisories/60221
https://secunia.com/advisories/60493
https://secunia.com/advisories/60684
https://secunia.com/advisories/60803
https://secunia.com/advisories/60917
https://secunia.com/advisories/60921
https://secunia.com/advisories/60938
https://secunia.com/advisories/61017
https://secunia.com/advisories/61100
https://secunia.com/advisories/61139
https://secunia.com/advisories/61184
https://secunia.com/advisories/61775
https://secunia.com/advisories/61959
https://security.gentoo.org/glsa/glsa-201412-39.xml
https://www.debian.org/security/2014/dsa-2998
https://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
https://www.mandriva.com/security/advisories?name=MDVSA-2014:158
https://www.securityfocus.com/bid/69084
https://www.securitytracker.com/id/1030693
https://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
https://www-01.ibm.com/support/docview.wss?uid=swg21682293
https://www-01.ibm.com/support/docview.wss?uid=swg21683389
https://www-01.ibm.com/support/docview.wss?uid=swg21686997
https://bugzilla.redhat.com/show_bug.cgi?id=1127498
https://exchange.xforce.ibmcloud.com/vulnerabilities/95159
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=fb0bc2b273bcc2d5401dd883fe869af4fc74bb21
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
https://support.citrix.com/article/CTX216642
https://techzone.ergon.ch/CVE-2014-3511
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
https://www.openssl.org/news/secadv_20140806.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41412
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2014-3510
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows remote DTLS servers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.
MitigationInstall update from vendor's website.
Vulnerable software versionsOpenSSL: 0.9.8y - 1.0.1
CPE2.3https:httpftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
https://linux.oracle.com/errata/ELSA-2014-1052.html
https://linux.oracle.com/errata/ELSA-2014-1053.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
https://marc.info/?l=bugtraq&m=140853041709441&w=2
https://marc.info/?l=bugtraq&m=141077370928502&w=2
https://marc.info/?l=bugtraq&m=142660345230545&w=2
https://rhn.redhat.com/errata/RHSA-2014-1256.html
https://rhn.redhat.com/errata/RHSA-2014-1297.html
https://secunia.com/advisories/58962
https://secunia.com/advisories/59221
https://secunia.com/advisories/59700
https://secunia.com/advisories/59710
https://secunia.com/advisories/59743
https://secunia.com/advisories/59756
https://secunia.com/advisories/60022
https://secunia.com/advisories/60221
https://secunia.com/advisories/60493
https://secunia.com/advisories/60684
https://secunia.com/advisories/60687
https://secunia.com/advisories/60778
https://secunia.com/advisories/60803
https://secunia.com/advisories/60824
https://secunia.com/advisories/60917
https://secunia.com/advisories/60921
https://secunia.com/advisories/60938
https://secunia.com/advisories/61017
https://secunia.com/advisories/61045
https://secunia.com/advisories/61100
https://secunia.com/advisories/61184
https://secunia.com/advisories/61250
https://secunia.com/advisories/61775
https://secunia.com/advisories/61959
https://security.gentoo.org/glsa/glsa-201412-39.xml
https://support.f5.com/kb/en-us/solutions/public/15000/500/sol15568.html
https://www.debian.org/security/2014/dsa-2998
https://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
https://www.mandriva.com/security/advisories?name=MDVSA-2014:158
https://www.securityfocus.com/bid/69082
https://www.securitytracker.com/id/1030693
https://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
https://www-01.ibm.com/support/docview.wss?uid=swg21682293
https://www-01.ibm.com/support/docview.wss?uid=swg21683389
https://www-01.ibm.com/support/docview.wss?uid=swg21686997
https://bugzilla.redhat.com/show_bug.cgi?id=1127503
https://exchange.xforce.ibmcloud.com/vulnerabilities/95164
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=17160033765480453be0a41335fa6b833691c049
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
https://www.openssl.org/news/secadv_20140806.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41413
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2014-3511
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
MitigationInstall update from vendor's website.
Vulnerable software versionsOpenSSL: 1.0.0k - 1.0.1
CPE2.3https:ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
https://linux.oracle.com/errata/ELSA-2014-1052.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
https://marc.info/?l=bugtraq&m=142350350616251&w=2
https://marc.info/?l=bugtraq&m=142495837901899&w=2
https://marc.info/?l=bugtraq&m=142624590206005&w=2
https://marc.info/?l=bugtraq&m=142660345230545&w=2
https://marc.info/?l=bugtraq&m=142791032306609&w=2
https://marc.info/?l=bugtraq&m=143290437727362&w=2
https://marc.info/?l=bugtraq&m=143290522027658&w=2
https://rhn.redhat.com/errata/RHSA-2015-0126.html
https://rhn.redhat.com/errata/RHSA-2015-0197.html
https://secunia.com/advisories/58962
https://secunia.com/advisories/59700
https://secunia.com/advisories/59710
https://secunia.com/advisories/59756
https://secunia.com/advisories/59887
https://secunia.com/advisories/60022
https://secunia.com/advisories/60221
https://secunia.com/advisories/60377
https://secunia.com/advisories/60493
https://secunia.com/advisories/60684
https://secunia.com/advisories/60803
https://secunia.com/advisories/60810
https://secunia.com/advisories/60890
https://secunia.com/advisories/60917
https://secunia.com/advisories/60921
https://secunia.com/advisories/60938
https://secunia.com/advisories/61017
https://secunia.com/advisories/61043
https://secunia.com/advisories/61100
https://secunia.com/advisories/61139
https://secunia.com/advisories/61184
https://secunia.com/advisories/61775
https://secunia.com/advisories/61959
https://security.gentoo.org/glsa/glsa-201412-39.xml
https://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html
https://www.arubanetworks.com/support/alerts/aid-08182014.txt
https://www.debian.org/security/2014/dsa-2998
https://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
https://www.securityfocus.com/bid/69079
https://www.securitytracker.com/id/1030693
https://www.splunk.com/view/SP-CAAANHS
https://www.tenable.com/security/tns-2014-06
https://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
https://www-01.ibm.com/support/docview.wss?uid=swg21682293
https://www-01.ibm.com/support/docview.wss?uid=swg21683389
https://www-01.ibm.com/support/docview.wss?uid=swg21686997
https://bugzilla.redhat.com/show_bug.cgi?id=1127504
https://exchange.xforce.ibmcloud.com/vulnerabilities/95162
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=280b1f1ad12131defcd986676a8fc9717aaa601b
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://kc.mcafee.com/corporate/index?page=content&id=SB10084
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
https://support.citrix.com/article/CTX216642
https://techzone.ergon.ch/CVE-2014-3511
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
https://www.openssl.org/news/secadv_20140806.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41414
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2014-3512
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.
MitigationInstall update from vendor's website.
Vulnerable software versionsOpenSSL: 1.0.0k - 1.0.1
CPE2.3https:ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
https://marc.info/?l=bugtraq&m=142660345230545&w=2
https://secunia.com/advisories/59700
https://secunia.com/advisories/59710
https://secunia.com/advisories/59756
https://secunia.com/advisories/60022
https://secunia.com/advisories/60221
https://secunia.com/advisories/60493
https://secunia.com/advisories/60803
https://secunia.com/advisories/60810
https://secunia.com/advisories/60917
https://secunia.com/advisories/60921
https://secunia.com/advisories/61017
https://secunia.com/advisories/61100
https://secunia.com/advisories/61171
https://secunia.com/advisories/61184
https://secunia.com/advisories/61775
https://secunia.com/advisories/61959
https://security.gentoo.org/glsa/glsa-201412-39.xml
https://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html
https://www.debian.org/security/2014/dsa-2998
https://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
https://www.securityfocus.com/bid/69083
https://www.securitytracker.com/id/1030693
https://www.tenable.com/security/tns-2014-06
https://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
https://www-01.ibm.com/support/docview.wss?uid=swg21682293
https://www-01.ibm.com/support/docview.wss?uid=swg21683389
https://www-01.ibm.com/support/docview.wss?uid=swg21686997
https://exchange.xforce.ibmcloud.com/vulnerabilities/95158
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=4a23b12a031860253b58d503f296377ca076427b
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
https://www.openssl.org/news/secadv_20140806.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41415
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2014-5139
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows remote SSL servers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
MitigationInstall update from vendor's website.
Vulnerable software versionsOpenSSL: 1.0.1c - 1.0.1
CPE2.3https:httpftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
https://marc.info/?l=bugtraq&m=142350350616251&w=2
https://marc.info/?l=bugtraq&m=142495837901899&w=2
https://marc.info/?l=bugtraq&m=142624590206005&w=2
https://marc.info/?l=bugtraq&m=142624619906067
https://marc.info/?l=bugtraq&m=142624619906067&w=2
https://marc.info/?l=bugtraq&m=142624679706236&w=2
https://marc.info/?l=bugtraq&m=142624719706349&w=2
https://marc.info/?l=bugtraq&m=142660345230545&w=2
https://marc.info/?l=bugtraq&m=142791032306609&w=2
https://marc.info/?l=bugtraq&m=143290437727362&w=2
https://marc.info/?l=bugtraq&m=143290522027658&w=2
https://secunia.com/advisories/59700
https://secunia.com/advisories/59710
https://secunia.com/advisories/59756
https://secunia.com/advisories/60022
https://secunia.com/advisories/60221
https://secunia.com/advisories/60493
https://secunia.com/advisories/60803
https://secunia.com/advisories/60810
https://secunia.com/advisories/60917
https://secunia.com/advisories/60921
https://secunia.com/advisories/61017
https://secunia.com/advisories/61100
https://secunia.com/advisories/61171
https://secunia.com/advisories/61184
https://secunia.com/advisories/61392
https://secunia.com/advisories/61775
https://secunia.com/advisories/61959
https://security.gentoo.org/glsa/glsa-201412-39.xml
https://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html
https://www.debian.org/security/2014/dsa-2998
https://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
https://www.securityfocus.com/bid/69077
https://www.securitytracker.com/id/1030693
https://www.tenable.com/security/tns-2014-06
https://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
https://www-01.ibm.com/support/docview.wss?uid=swg21682293
https://www-01.ibm.com/support/docview.wss?uid=swg21683389
https://www-01.ibm.com/support/docview.wss?uid=swg21686997
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=80bd7b41b30af6ee96f519e629463583318de3b0
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=83764a989dcc87fbea337da5f8f86806fe767b7e
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
https://www.openssl.org/news/secadv_20140806.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.