Executive Summary
Summary | |
---|---|
Title | openssl security update |
Informations | |||
---|---|---|---|
Name | DSA-3125 | First vendor Publication | 2015-01-11 |
Vendor | Debian | Last vendor Modification | 2015-01-11 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit. The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2014-3569 Frank Schmirler reported that the ssl23_get_client_hello function in OpenSSL does not properly handle attempts to use unsupported protocols. When OpenSSL is built with the no-ssl3 option and a SSL v3 ClientHello is received, the ssl method would be set to NULL which could later result in a NULL pointer dereference and daemon crash. CVE-2014-3570 Pieter Wuille of Blockstream reported that the bignum squaring (BN_sqr) may produce incorrect results on some platforms, which might make it easier for remote attackers to defeat cryptographic protection mechanisms. CVE-2014-3571 Markus Stenberg of Cisco Systems, Inc. reported that a carefully crafted DTLS message can cause a segmentation fault in OpenSSL due to a NULL pointer dereference. A remote attacker could use this flaw to mount a denial of service attack. CVE-2014-3572 Karthikeyan Bhargavan of the PROSECCO team at INRIA reported that an OpenSSL client would accept a handshake using an ephemeral ECDH ciphersuite if the server key exchange message is omitted. This allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy. CVE-2014-8275 Antti Karjalainen and Tuomo Untinen of the Codenomicon CROSS project and Konrad Kraszewski of Google reported various certificate fingerprint issues, which allow remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism. CVE-2015-0204 Karthikeyan Bhargavan of the PROSECCO team at INRIA reported that an OpenSSL client will accept the use of an ephemeral RSA key in a non-export RSA key exchange ciphersuite, violating the TLS standard. This allows remote SSL servers to downgrade the security of the session. CVE-2015-0205 Karthikeyan Bhargavan of the PROSECCO team at INRIA reported that an OpenSSL server will accept a DH certificate for client authentication without the certificate verify message. This flaw effectively allows a client to authenticate without the use of a private key via crafted TLS handshake protocol traffic to a server that recognizes a certification authority with DH support. CVE-2015-0206 Chris Mueller discovered a memory leak in the dtls1_buffer_record function. A remote attacker could exploit this flaw to mount a denial of service through memory exhaustion by repeatedly sending specially crafted DTLS records. For the stable distribution (wheezy), these problems have been fixed in version 1.0.1e-2+deb7u14. For the upcoming stable distribution (jessie), these problems will be fixed soon. For the unstable distribution (sid), these problems have been fixed in version 1.0.1k-1. We recommend that you upgrade your openssl packages. |
Original Source
Url : http://www.debian.org/security/2015/dsa-3125 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
83 % | CWE-310 | Cryptographic Issues |
17 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-09-03 | IAVM : 2015-B-0106 - Multiple Vulnerabilities in HP Version Control Repository Manager Severity : Category I - VMSKEY : V0061359 |
2015-07-16 | IAVM : 2015-A-0154 - Multiple Vulnerabilities in Oracle Fusion Middleware Severity : Category I - VMSKEY : V0061081 |
2015-07-16 | IAVM : 2015-A-0160 - Multiple Vulnerabilities in Oracle Linux and Virtualization Severity : Category I - VMSKEY : V0061123 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-10-01 | OpenSSL DTLS duplicate record denial of service attempt RuleID : 51359 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL DTLS duplicate record denial of service attempt RuleID : 51358 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL DTLS duplicate record denial of service attempt RuleID : 51357 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL DTLS duplicate record denial of service attempt RuleID : 51356 - Revision : 1 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33806 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33805 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33804 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33803 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33802 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33801 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33800 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33799 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33798 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33797 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33796 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33795 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33794 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33793 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33792 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33791 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33790 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33789 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33788 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33787 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33786 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade cipher suite attempt RuleID : 33785 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33784 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33783 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33782 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33781 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33780 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL request for export grade ciphersuite attempt RuleID : 33779 - Revision : 5 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33778 - Revision : 6 - Type : SERVER-OTHER |
2015-04-14 | SSL export grade ciphersuite server negotiation attempt RuleID : 33777 - Revision : 6 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33703 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33702 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33701 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33700 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33699 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33698 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33697 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33696 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33695 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33694 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33693 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33692 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33691 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33690 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33689 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33688 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33687 - Revision : 2 - Type : SERVER-OTHER |
2015-04-07 | SSL request for export grade ciphersuite attempt RuleID : 33686 - Revision : 2 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-12-07 | Name : The remote host is potentially affected by an SSL/TLS vulnerability. File : check_point_gaia_sk103683.nasl - Type : ACT_GATHER_INFO |
2016-07-22 | Name : The remote database server is affected by multiple vulnerabilities. File : oracle_rdbms_cpu_jul_2016.nasl - Type : ACT_GATHER_INFO |
2016-06-23 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2016-0086.nasl - Type : ACT_GATHER_INFO |
2016-06-22 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2016-0071.nasl - Type : ACT_GATHER_INFO |
2016-03-29 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_2_6.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-294.nasl - Type : ACT_GATHER_INFO |
2016-01-14 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-0113-1.nasl - Type : ACT_GATHER_INFO |
2016-01-06 | Name : The remote database server is affected by multiple vulnerabilities. File : db2_105fp7_win.nasl - Type : ACT_GATHER_INFO |
2016-01-06 | Name : The remote database server is affected by multiple vulnerabilities. File : db2_105fp7_nix.nasl - Type : ACT_GATHER_INFO |
2015-12-30 | Name : A web application on the remote host is affected by multiple vulnerabilities. File : puppet_enterprise_380.nasl - Type : ACT_GATHER_INFO |
2015-12-16 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-2168-2.nasl - Type : ACT_GATHER_INFO |
2015-12-11 | Name : The remote multi-function device is affected by multiple vulnerabilities. File : xerox_xrx15r.nasl - Type : ACT_GATHER_INFO |
2015-12-11 | Name : The remote multi-function device is affected by multiple vulnerabilities. File : xerox_xrx15ad_colorqube.nasl - Type : ACT_GATHER_INFO |
2015-12-11 | Name : The remote multi-function device is affected by multiple vulnerabilities. File : xerox_xrx15aj.nasl - Type : ACT_GATHER_INFO |
2015-12-11 | Name : The remote multi-function device is affected by multiple vulnerabilities. File : xerox_xrx15am.nasl - Type : ACT_GATHER_INFO |
2015-12-11 | Name : The remote multi-function device is affected by a man-in-the-middle vulnerabi... File : xerox_xrx15ap.nasl - Type : ACT_GATHER_INFO |
2015-12-11 | Name : The remote multi-function device is affected by multiple vulnerabilities. File : xerox_xrx15av.nasl - Type : ACT_GATHER_INFO |
2015-12-09 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-2216-1.nasl - Type : ACT_GATHER_INFO |
2015-12-04 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-2182-1.nasl - Type : ACT_GATHER_INFO |
2015-12-03 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-2168-1.nasl - Type : ACT_GATHER_INFO |
2015-12-03 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-2166-1.nasl - Type : ACT_GATHER_INFO |
2015-10-19 | Name : The remote printer is affected by a security bypass vulnerability known as FR... File : lexmark_printer_TE701.nasl - Type : ACT_GATHER_INFO |
2015-10-05 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL16139.nasl - Type : ACT_GATHER_INFO |
2015-09-04 | Name : The remote Linux host has an application installed that is affected by multip... File : hp_version_control_repo_manager_7_5_0_nix.nasl - Type : ACT_GATHER_INFO |
2015-09-04 | Name : The remote Windows host has an application installed that is affected by mult... File : hp_version_control_repo_manager_7_5_0_0.nasl - Type : ACT_GATHER_INFO |
2015-08-03 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_4_1.nasl - Type : ACT_GATHER_INFO |
2015-07-27 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-507.nasl - Type : ACT_GATHER_INFO |
2015-07-22 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_5.nasl - Type : ACT_GATHER_INFO |
2015-06-29 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1086-4.nasl - Type : ACT_GATHER_INFO |
2015-06-26 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1138-1.nasl - Type : ACT_GATHER_INFO |
2015-06-26 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1086-3.nasl - Type : ACT_GATHER_INFO |
2015-06-23 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1086-2.nasl - Type : ACT_GATHER_INFO |
2015-06-19 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1086-1.nasl - Type : ACT_GATHER_INFO |
2015-06-19 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1085-1.nasl - Type : ACT_GATHER_INFO |
2015-06-10 | Name : The remote AIX host has a version of Java SDK installed that is affected by m... File : aix_java_april2015_advisory.nasl - Type : ACT_GATHER_INFO |
2015-06-09 | Name : The remote Windows host has VPN client software installed that is affected by... File : smb_kb3062760.nasl - Type : ACT_GATHER_INFO |
2015-06-04 | Name : The remote web server is running an application that is affected by multiple ... File : splunk_618.nasl - Type : ACT_GATHER_INFO |
2015-05-27 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0946-1.nasl - Type : ACT_GATHER_INFO |
2015-05-19 | Name : The remote Apache Tomcat server is affected by multiple vulnerabilities. File : tomcat_8_0_21.nasl - Type : ACT_GATHER_INFO |
2015-05-19 | Name : The remote Apache Tomcat server is affected by multiple vulnerabilities. File : tomcat_7_0_60.nasl - Type : ACT_GATHER_INFO |
2015-05-19 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20150310-ssl-nxos.nasl - Type : ACT_GATHER_INFO |
2015-05-15 | Name : The remote Apache Tomcat server is affected by multiple vulnerabilities. File : tomcat_6_0_44.nasl - Type : ACT_GATHER_INFO |
2015-04-21 | Name : The remote host is affected by multiple vulnerabilities. File : juniper_nsm_jsa10679.nasl - Type : ACT_GATHER_INFO |
2015-04-21 | Name : The remote device is missing a vendor-supplied security patch. File : juniper_jsa10679.nasl - Type : ACT_GATHER_INFO |
2015-04-16 | Name : The remote Windows host contains a programming platform that is affected by m... File : oracle_jrockit_cpu_apr_2015.nasl - Type : ACT_GATHER_INFO |
2015-04-16 | Name : The remote Unix host contains a programming platform that is affected by mult... File : oracle_java_cpu_apr_2015_unix.nasl - Type : ACT_GATHER_INFO |
2015-04-16 | Name : The remote Windows host contains a programming platform that is affected by m... File : oracle_java_cpu_apr_2015.nasl - Type : ACT_GATHER_INFO |
2015-04-15 | Name : The remote database server is affected by multiple denial of service vulnerab... File : mysql_5_6_23.nasl - Type : ACT_GATHER_INFO |
2015-04-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-0800.nasl - Type : ACT_GATHER_INFO |
2015-04-14 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20150413_openssl_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2015-04-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0800.nasl - Type : ACT_GATHER_INFO |
2015-04-14 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-0800.nasl - Type : ACT_GATHER_INFO |
2015-04-10 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_SecUpd2015-004.nasl - Type : ACT_GATHER_INFO |
2015-04-10 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_10_10_3.nasl - Type : ACT_GATHER_INFO |
2015-04-09 | Name : The remote device is affected by a security feature bypass vulnerability. File : bluecoat_proxy_sg_6_5_6_2.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-063.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-062.nasl - Type : ACT_GATHER_INFO |
2015-03-27 | Name : The remote Windows host has an application that is affected by the FREAK vuln... File : blackberry_es_freak_kb36811.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote host is affected by multiple vulnerabilities. File : macosx_cisco_anyconnect_3_1_7021.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote host is affected by multiple vulnerabilities. File : cisco_anyconnect_3_1_7021.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-132.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-81.nasl - Type : ACT_GATHER_INFO |
2015-03-24 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201503-11.nasl - Type : ACT_GATHER_INFO |
2015-03-20 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_9d15355bce7c11e49db0d050992ecde8.nasl - Type : ACT_GATHER_INFO |
2015-03-18 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2015-0030.nasl - Type : ACT_GATHER_INFO |
2015-03-17 | Name : The remote Mac OS X host has a web browser installed that is affected by the ... File : macosx_opera_28_0_1750_40.nasl - Type : ACT_GATHER_INFO |
2015-03-13 | Name : The remote web server contains an application that is affected by multiple vu... File : splunk_622.nasl - Type : ACT_GATHER_INFO |
2015-03-13 | Name : The remote host is affected by multiple vulnerabilities. File : mcafee_firewall_enterprise_SB10102.nasl - Type : ACT_GATHER_INFO |
2015-03-10 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2015-0029.nasl - Type : ACT_GATHER_INFO |
2015-03-05 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_google_chrome_41_0_2272_76.nasl - Type : ACT_GATHER_INFO |
2015-03-04 | Name : The remote host supports a set of weak ciphers. File : ssl_rsa_export_supported_ciphers.nasl - Type : ACT_GATHER_INFO |
2015-02-18 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL16135.nasl - Type : ACT_GATHER_INFO |
2015-02-18 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL16126.nasl - Type : ACT_GATHER_INFO |
2015-02-18 | Name : The remote AIX host has a version of OpenSSL installed that is affected by mu... File : aix_openssl_advisory12.nasl - Type : ACT_GATHER_INFO |
2015-02-12 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL16123.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libopenssl-devel-150112.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_compat-openssl097g-150122.nasl - Type : ACT_GATHER_INFO |
2015-01-26 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-67.nasl - Type : ACT_GATHER_INFO |
2015-01-23 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2015-0005.nasl - Type : ACT_GATHER_INFO |
2015-01-23 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_f9c388c5a25611e4992a7b2a515a1247.nasl - Type : ACT_GATHER_INFO |
2015-01-22 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20150121_openssl_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2015-01-21 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-0066.nasl - Type : ACT_GATHER_INFO |
2015-01-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-0066.nasl - Type : ACT_GATHER_INFO |
2015-01-21 | Name : The remote Fedora host is missing a security update. File : fedora_2015-0601.nasl - Type : ACT_GATHER_INFO |
2015-01-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0066.nasl - Type : ACT_GATHER_INFO |
2015-01-16 | Name : The remote service is affected by multiple vulnerabilities. File : openssl_1_0_1k.nasl - Type : ACT_GATHER_INFO |
2015-01-16 | Name : The remote service is affected by multiple vulnerabilities. File : openssl_1_0_0p.nasl - Type : ACT_GATHER_INFO |
2015-01-16 | Name : The remote service is affected by multiple vulnerabilities. File : openssl_0_9_8zd.nasl - Type : ACT_GATHER_INFO |
2015-01-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2459-1.nasl - Type : ACT_GATHER_INFO |
2015-01-13 | Name : The remote Fedora host is missing a security update. File : fedora_2015-0512.nasl - Type : ACT_GATHER_INFO |
2015-01-13 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2015-469.nasl - Type : ACT_GATHER_INFO |
2015-01-12 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-019.nasl - Type : ACT_GATHER_INFO |
2015-01-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3125.nasl - Type : ACT_GATHER_INFO |
2015-01-12 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2015-009-01.nasl - Type : ACT_GATHER_INFO |
2015-01-09 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_4e536c14979111e4977dd050992ecde8.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-12-22 09:25:36 |
|
2016-12-08 09:25:38 |
|
2016-10-26 09:24:11 |
|
2016-10-25 09:23:21 |
|
2016-08-20 09:24:01 |
|
2016-08-09 09:25:35 |
|
2016-07-21 12:09:14 |
|
2016-04-27 03:43:56 |
|
2016-04-12 05:31:35 |
|
2016-01-22 09:26:09 |
|
2015-07-17 09:24:19 |
|
2015-06-12 05:30:55 |
|
2015-06-04 09:31:22 |
|
2015-04-23 09:31:49 |
|
2015-04-22 00:32:38 |
|
2015-04-21 09:31:18 |
|
2015-04-17 09:31:56 |
|
2015-04-14 09:31:33 |
|
2015-04-02 01:00:14 |
|
2015-04-01 09:30:33 |
|
2015-03-26 00:34:26 |
|
2015-03-24 09:33:43 |
|
2015-03-20 00:31:53 |
|
2015-03-17 09:30:45 |
|
2015-03-10 09:27:31 |
|
2015-03-06 00:26:39 |
|
2015-03-05 09:26:17 |
|
2015-02-27 21:28:16 |
|
2015-02-21 09:28:21 |
|
2015-01-17 05:31:32 |
|
2015-01-13 13:23:46 |
|
2015-01-11 13:21:01 |
|