7.5
CVE-2014-0160
- EPSS 94.48%
- Published 07.04.2014 22:55:03
- Last modified 12.04.2025 10:46:40
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
Data is provided by the National Vulnerability Database (NVD)
Filezilla-project ≫ Filezilla Server Version < 0.9.44
Siemens ≫ Application Processing Engine Firmware Version2.0
Siemens ≫ Cp 1543-1 Firmware Version1.1
Siemens ≫ Simatic S7-1500 Firmware Version1.5
Siemens ≫ Simatic S7-1500t Firmware Version1.5
Siemens ≫ Wincc Open Architecture Version3.12
Intellian ≫ V100 Firmware Version1.20
Intellian ≫ V100 Firmware Version1.21
Intellian ≫ V100 Firmware Version1.24
Intellian ≫ V60 Firmware Version1.15
Intellian ≫ V60 Firmware Version1.25
Canonical ≫ Ubuntu Linux Version12.04 SwEditionesm
Canonical ≫ Ubuntu Linux Version12.10
Canonical ≫ Ubuntu Linux Version13.10
Fedoraproject ≫ Fedora Version19
Fedoraproject ≫ Fedora Version20
Redhat ≫ Gluster Storage Version2.1
Redhat ≫ Virtualization Version6.0
Redhat ≫ Enterprise Linux Desktop Version6.0
Redhat ≫ Enterprise Linux Server Version6.0
Redhat ≫ Enterprise Linux Server Aus Version6.5
Redhat ≫ Enterprise Linux Server Eus Version6.5
Redhat ≫ Enterprise Linux Server Tus Version6.5
Redhat ≫ Enterprise Linux Workstation Version6.0
Debian ≫ Debian Linux Version6.0
Debian ≫ Debian Linux Version7.0
Debian ≫ Debian Linux Version8.0
Broadcom ≫ Symantec Messaging Gateway Version10.6.0
Broadcom ≫ Symantec Messaging Gateway Version10.6.1
04.05.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
OpenSSL Information Disclosure Vulnerability
VulnerabilityThe TLS and DTLS implementations in OpenSSL do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information.
DescriptionApply updates per vendor instructions.
Required actionsType | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 94.48% | 1 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-125 Out-of-bounds Read
The product reads data past the end, or before the beginning, of the intended buffer.