Executive Summary
Summary | |
---|---|
Title | OpenSSL: Multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | GLSA-201412-39 | First vendor Publication | 2014-12-26 |
Vendor | Gentoo | Last vendor Modification | 2014-12-26 |
Severity (Vendor) | Normal | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Synopsis Multiple vulnerabilities have been found in OpenSSL, the worst of which could result in Denial of Service or Man-in-the-Middle attacks. Background Description Impact Workaround Resolution All OpenSSL 0.9.8 users should upgrade to the latest version: Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying these packages. References Availability http://security.gentoo.org/glsa/glsa-201412-39.xml |
Original Source
Url : http://security.gentoo.org/glsa/glsa-201412-39.xml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
30 % | CWE-399 | Resource Management Errors |
30 % | CWE-310 | Cryptographic Issues |
20 % | CWE-20 | Improper Input Validation |
10 % | CWE-362 | Race Condition |
10 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:21330 | |||
Oval ID: | oval:org.mitre.oval:def:21330 | ||
Title: | DSA-2833-1 openssl - several | ||
Description: | Multiple security issues have been fixed in OpenSSL: The TLS 1.2 support was susceptible to denial of service and retransmission of DTLS messages was fixed. In addition this update disables the insecure Dual_EC_DRBG algorithm (which was unused anyway, see<a href="http://marc.info/?l=openssl-announce&m=138747119822324&w=2">http://marc.info/?l=openssl-announce&m=138747119822324&w=2</a> for further information) and no longer uses the RdRand feature available on some Intel CPUs as a sole source of entropy unless explicitly requested. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2833-1 CVE-2013-6449 CVE-2013-6450 | Version: | 5 |
Platform(s): | Debian GNU/Linux 7 Debian GNU/kFreeBSD 7 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21337 | |||
Oval ID: | oval:org.mitre.oval:def:21337 | ||
Title: | USN-2079-1 -- openssl vulnerabilities | ||
Description: | Several security issues were fixed in OpenSSL. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2079-1 CVE-2013-4353 CVE-2013-6449 CVE-2013-6450 | Version: | 5 |
Platform(s): | Ubuntu 13.10 Ubuntu 13.04 Ubuntu 12.10 Ubuntu 12.04 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22018 | |||
Oval ID: | oval:org.mitre.oval:def:22018 | ||
Title: | RHSA-2014:0015: openssl security update (Important) | ||
Description: | The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:0015-00 CESA-2014:0015 CVE-2013-4353 CVE-2013-6449 CVE-2013-6450 | Version: | 44 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22174 | |||
Oval ID: | oval:org.mitre.oval:def:22174 | ||
Title: | AIX OpenSSH Vulnerability | ||
Description: | The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-6449 | Version: | 4 |
Platform(s): | IBM AIX 5.3 IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22518 | |||
Oval ID: | oval:org.mitre.oval:def:22518 | ||
Title: | AIX OpenSSH Vulnerability | ||
Description: | The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-6450 | Version: | 4 |
Platform(s): | IBM AIX 5.3 IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24168 | |||
Oval ID: | oval:org.mitre.oval:def:24168 | ||
Title: | Vulnerability in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f, might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) | ||
Description: | The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-6450 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24182 | |||
Oval ID: | oval:org.mitre.oval:def:24182 | ||
Title: | ELSA-2014:0015: openssl security update (Important) | ||
Description: | The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014:0015-00 CVE-2013-4353 CVE-2013-6449 CVE-2013-6450 | Version: | 17 |
Platform(s): | Oracle Linux 6 | Product(s): | openssl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25001 | |||
Oval ID: | oval:org.mitre.oval:def:25001 | ||
Title: | Vulnerability in OpenSSL before 1.0.2, obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) | ||
Description: | The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-6449 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25950 | |||
Oval ID: | oval:org.mitre.oval:def:25950 | ||
Title: | Vulnerability in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) | ||
Description: | The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-3510 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25965 | |||
Oval ID: | oval:org.mitre.oval:def:25965 | ||
Title: | Vulnerability in OpenSSL 1.0.1 before 1.0.1i, allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact | ||
Description: | Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-3512 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25983 | |||
Oval ID: | oval:org.mitre.oval:def:25983 | ||
Title: | AIX OpenSSL Denial of Service due to NULL pointer dereference | ||
Description: | The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-5139 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26147 | |||
Oval ID: | oval:org.mitre.oval:def:26147 | ||
Title: | Vulnerability in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data | ||
Description: | Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-3509 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26169 | |||
Oval ID: | oval:org.mitre.oval:def:26169 | ||
Title: | AIX OpenSSL Denial of Service due to NULL pointer dereference | ||
Description: | The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-3510 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26293 | |||
Oval ID: | oval:org.mitre.oval:def:26293 | ||
Title: | Vulnerability in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, allows remote attackers to cause a denial of service (CVE-2014-3507) | ||
Description: | Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-3507 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26315 | |||
Oval ID: | oval:org.mitre.oval:def:26315 | ||
Title: | RHSA-2014:1053: openssl security update (Moderate) | ||
Description: | OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library. It was discovered that the OBJ_obj2txt() function could fail to properly NUL-terminate its output. This could possibly cause an application using OpenSSL functions to format fields of X.509 certificates to disclose portions of its memory. (CVE-2014-3508) Multiple flaws were discovered in the way OpenSSL handled DTLS packets. A remote attacker could use these flaws to cause a DTLS server or client using OpenSSL to crash or use excessive amounts of memory. (CVE-2014-0221, CVE-2014-3505, CVE-2014-3506) A NULL pointer dereference flaw was found in the way OpenSSL performed a handshake when using the anonymous Diffie-Hellman (DH) key exchange. A malicious server could cause a DTLS client using OpenSSL to crash if that client had anonymous DH cipher suites enabled. (CVE-2014-3510) Red Hat would like to thank the OpenSSL project for reporting CVE-2014-0221. Upstream acknowledges Imre Rad of Search-Lab as the original reporter of this issue. All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1053-00 CESA-2014:1053 CVE-2014-0221 CVE-2014-3505 CVE-2014-3506 CVE-2014-3508 CVE-2014-3510 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26324 | |||
Oval ID: | oval:org.mitre.oval:def:26324 | ||
Title: | Vulnerability in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, allows remote attackers to cause a denial of service (CVE-2014-3506) | ||
Description: | d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-3506 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26329 | |||
Oval ID: | oval:org.mitre.oval:def:26329 | ||
Title: | AIX OpenSSL Denial of Service due to invalid SRP (1)g, (2)A or (3)B parameter | ||
Description: | Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-3512 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26342 | |||
Oval ID: | oval:org.mitre.oval:def:26342 | ||
Title: | Vulnerability in OpenSSL 1.0.1 before 1.0.1i, allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue | ||
Description: | The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-3511 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26347 | |||
Oval ID: | oval:org.mitre.oval:def:26347 | ||
Title: | AIX OpenSSL Man-in-the-Middle attack related to protocol downgrade issue | ||
Description: | The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-3511 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26351 | |||
Oval ID: | oval:org.mitre.oval:def:26351 | ||
Title: | DSA-2998-1 openssl - security update | ||
Description: | Multiple vulnerabilities have been identified in OpenSSL, a Secure Sockets Layer toolkit, that may result in denial of service (application crash, large memory consumption), information leak, protocol downgrade. Additionally, a buffer overrun affecting only applications explicitly set up for SRP has been fixed (<a href="https://security-tracker.debian.org/tracker/CVE-2014-3512">CVE-2014-3512</a>). | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2998-1 CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 CVE-2014-3511 CVE-2014-3512 CVE-2014-5139 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26369 | |||
Oval ID: | oval:org.mitre.oval:def:26369 | ||
Title: | Vulnerability in OpenSSL 1.0.1 before 1.0.1i, allows remote SSL servers to cause a denial of service | ||
Description: | The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-5139 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26381 | |||
Oval ID: | oval:org.mitre.oval:def:26381 | ||
Title: | USN-2308-1 -- openssl vulnerabilities | ||
Description: | Several security issues were fixed in OpenSSL. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2308-1 CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 CVE-2014-3511 CVE-2014-3512 CVE-2014-5139 | Version: | 3 |
Platform(s): | Ubuntu 14.04 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26416 | |||
Oval ID: | oval:org.mitre.oval:def:26416 | ||
Title: | AIX OpenSSL Denial of Service due to memory consumption | ||
Description: | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-3567 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26426 | |||
Oval ID: | oval:org.mitre.oval:def:26426 | ||
Title: | RHSA-2014:1052: openssl security update (Moderate) | ||
Description: | OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library. A race condition was found in the way OpenSSL handled ServerHello messages with an included Supported EC Point Format extension. A malicious server could possibly use this flaw to cause a multi-threaded TLS/SSL client using OpenSSL to write into freed memory, causing the client to crash or execute arbitrary code. (CVE-2014-3509) It was discovered that the OBJ_obj2txt() function could fail to properly NUL-terminate its output. This could possibly cause an application using OpenSSL functions to format fields of X.509 certificates to disclose portions of its memory. (CVE-2014-3508) A flaw was found in the way OpenSSL handled fragmented handshake packets. A man-in-the-middle attacker could use this flaw to force a TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client and the server supported newer protocol versions. (CVE-2014-3511) Multiple flaws were discovered in the way OpenSSL handled DTLS packets. A remote attacker could use these flaws to cause a DTLS server or client using OpenSSL to crash or use excessive amounts of memory. (CVE-2014-3505, CVE-2014-3506, CVE-2014-3507) A NULL pointer dereference flaw was found in the way OpenSSL performed a handshake when using the anonymous Diffie-Hellman (DH) key exchange. A malicious server could cause a DTLS client using OpenSSL to crash if that client had anonymous DH cipher suites enabled. (CVE-2014-3510) All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1052-00 CESA-2014:1052 CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 CVE-2014-3511 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 CentOS Linux 6 CentOS Linux 7 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26491 | |||
Oval ID: | oval:org.mitre.oval:def:26491 | ||
Title: | Vulnerability in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition | ||
Description: | Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-3505 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26548 | |||
Oval ID: | oval:org.mitre.oval:def:26548 | ||
Title: | DSA-3053-1 openssl - security update | ||
Description: | Several vulnerabilities have been found in OpenSSL, the Secure Sockets Layer library and toolkit. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3053-1 CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26562 | |||
Oval ID: | oval:org.mitre.oval:def:26562 | ||
Title: | SUSE-SU-2014:1049-1 -- Security update for OpenSSL | ||
Description: | This OpenSSL update fixes the several security issue. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1049-1 CVE-2014-3508 CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3510 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26622 | |||
Oval ID: | oval:org.mitre.oval:def:26622 | ||
Title: | AIX OpenSSL Denial of Service due to double free | ||
Description: | Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-3505 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26740 | |||
Oval ID: | oval:org.mitre.oval:def:26740 | ||
Title: | AIX OpenSSL Denial of Service due to memory allocation of large length values | ||
Description: | d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-3506 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26743 | |||
Oval ID: | oval:org.mitre.oval:def:26743 | ||
Title: | AIX OpenSSL Denial of Service due to memory leak in DTLS SRTP extension | ||
Description: | Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-3513 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26781 | |||
Oval ID: | oval:org.mitre.oval:def:26781 | ||
Title: | DEPRECATED: SUSE-SU-2014:1049-1 -- Security update for OpenSSL | ||
Description: | This OpenSSL update fixes the several security issue. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1049-1 CVE-2014-3508 CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3510 | Version: | 4 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26802 | |||
Oval ID: | oval:org.mitre.oval:def:26802 | ||
Title: | AIX OpenSSL Denial of Service due to improper handling of the return value | ||
Description: | Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-3507 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26829 | |||
Oval ID: | oval:org.mitre.oval:def:26829 | ||
Title: | RHSA-2014:1652: openssl security update (Important) | ||
Description: | OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library. This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails. This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication. For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123 A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server. (CVE-2014-3513) A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server. (CVE-2014-3567) All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to mitigate the CVE-2014-3566 issue and correct the CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1652-00 CESA-2014:1652 CVE-2014-3513 CVE-2014-3567 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 CentOS Linux 6 CentOS Linux 7 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26904 | |||
Oval ID: | oval:org.mitre.oval:def:26904 | ||
Title: | AIX OpenSSL Denial of Service due to memory overwrite | ||
Description: | Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-3509 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26954 | |||
Oval ID: | oval:org.mitre.oval:def:26954 | ||
Title: | ELSA-2014-1053 -- openssl security update (moderate) | ||
Description: | [0.9.8e-27.4] - fix CVE-2014-0221 - recursion in DTLS code leading to DoS - fix CVE-2014-3505 - doublefree in DTLS packet processing - fix CVE-2014-3506 - avoid memory exhaustion in DTLS - fix CVE-2014-3508 - fix OID handling to avoid information leak - fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-1053 CVE-2014-0221 CVE-2014-3505 CVE-2014-3506 CVE-2014-3508 CVE-2014-3510 | Version: | 3 |
Platform(s): | Oracle Linux 5 | Product(s): | openssl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27052 | |||
Oval ID: | oval:org.mitre.oval:def:27052 | ||
Title: | USN-2385-1 -- OpenSSL vulnerabilities | ||
Description: | It was discovered that OpenSSL incorrectly handled memory when parsing DTLS SRTP extension data. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-3513">CVE-2014-3513</a>) It was discovered that OpenSSL incorrectly handled memory when verifying the integrity of a session ticket. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, resulting in a denial of service. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-3567">CVE-2014-3567</a>) In addition, this update introduces support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV). This new feature prevents protocol downgrade attacks when certain applications such as web browsers attempt to reconnect using a lower protocol version for interoperability reasons. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2385-1 CVE-2014-3513 CVE-2014-3567 | Version: | 3 |
Platform(s): | Ubuntu 14.04 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27084 | |||
Oval ID: | oval:org.mitre.oval:def:27084 | ||
Title: | ELSA-2014-1652 -- openssl security update | ||
Description: | [1.0.1e-30.2] - fix CVE-2014-3567 - memory leak when handling session tickets - fix CVE-2014-3513 - memory leak in srtp support - add support for fallback SCSV to partially mitigate CVE-2014-3566 (padding attack on SSL3) [1.0.1e-30] - add ECC TLS extensions to DTLS (#1119800) [1.0.1e-29] - fix CVE-2014-3505 - doublefree in DTLS packet processing - fix CVE-2014-3506 - avoid memory exhaustion in DTLS - fix CVE-2014-3507 - avoid memory leak in DTLS - fix CVE-2014-3508 - fix OID handling to avoid information leak - fix CVE-2014-3509 - fix race condition when parsing server hello - fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS - fix CVE-2014-3511 - disallow protocol downgrade via fragmentation [1.0.1e-28] - fix CVE-2014-0224 fix that broke EAP-FAST session resumption support [1.0.1e-26] - drop EXPORT, RC2, and DES from the default cipher list (#1057520) - print ephemeral key size negotiated in TLS handshake (#1057715) - do not include ECC ciphersuites in SSLv2 client hello (#1090952) - properly detect encryption failure in BIO (#1100819) - fail on hmac integrity check if the .hmac file is empty (#1105567) - FIPS mode: make the limitations on DSA, DH, and RSA keygen length enforced only if OPENSSL_ENFORCE_MODULUS_BITS environment variable is set [1.0.1e-25] - fix CVE-2010-5298 - possible use of memory after free - fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment - fix CVE-2014-0198 - possible NULL pointer dereference - fix CVE-2014-0221 - DoS from invalid DTLS handshake packet - fix CVE-2014-0224 - SSL/TLS MITM vulnerability - fix CVE-2014-3470 - client-side DoS when using anonymous ECDH [1.0.1e-24] - add back support for secp521r1 EC curve [1.0.1e-23] - fix CVE-2014-0160 - information disclosure in TLS heartbeat extension [1.0.1e-22] - use 2048 bit RSA key in FIPS selftests [1.0.1e-21] - add DH_compute_key_padded needed for FIPS CAVS testing - make 3des strength to be 128 bits instead of 168 (#1056616) - FIPS mode: do not generate DSA keys and DH parameters < 2048 bits - FIPS mode: use approved RSA keygen (allows only 2048 and 3072 bit keys) - FIPS mode: add DH selftest - FIPS mode: reseed DRBG properly on RAND_add() - FIPS mode: add RSA encrypt/decrypt selftest - FIPS mode: add hard limit for 2^32 GCM block encryptions with the same key - use the key length from configuration file if req -newkey rsa is invoked [1.0.1e-20] - fix CVE-2013-4353 - Invalid TLS handshake crash [1.0.1e-19] - fix CVE-2013-6450 - possible MiTM attack on DTLS1 [1.0.1e-18] - fix CVE-2013-6449 - crash when version in SSL structure is incorrect [1.0.1e-17] - add back some no-op symbols that were inadvertently dropped | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-1652 CVE-2014-3513 CVE-2014-3567 | Version: | 6 |
Platform(s): | Oracle Linux 6 Oracle Linux 7 | Product(s): | openssl openssl-devel openssl-perl openssl-static openssl-libs |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27233 | |||
Oval ID: | oval:org.mitre.oval:def:27233 | ||
Title: | ELSA-2014-1052 -- openssl security update (moderate) | ||
Description: | [1.0.1e-34.4] - fix CVE-2014-3505 - doublefree in DTLS packet processing - fix CVE-2014-3506 - avoid memory exhaustion in DTLS - fix CVE-2014-3507 - avoid memory leak in DTLS - fix CVE-2014-3508 - fix OID handling to avoid information leak - fix CVE-2014-3509 - fix race condition when parsing server hello - fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS - fix CVE-2014-3511 - disallow protocol downgrade via fragmentation | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-1052 CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 CVE-2014-3511 | Version: | 5 |
Platform(s): | Oracle Linux 6 Oracle Linux 7 | Product(s): | openssl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27273 | |||
Oval ID: | oval:org.mitre.oval:def:27273 | ||
Title: | DEPRECATED: ELSA-2014-0015 -- openssl security update (important) | ||
Description: | [1.0.1e-16.4] - fix CVE-2013-4353 - Invalid TLS handshake crash [1.0.1e-16.3] - fix CVE-2013-6450 - possible MiTM attack on DTLS1 [1.0.1e-16.2] - fix CVE-2013-6449 - crash when version in SSL structure is incorrect | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-0015 CVE-2013-4353 CVE-2013-6449 CVE-2013-6450 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | openssl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28044 | |||
Oval ID: | oval:org.mitre.oval:def:28044 | ||
Title: | SUSE-SU-2014:1557-2 -- Security update for compat-openssl097g (moderate) | ||
Description: | The SLES 9 compatibility package compat-openssl097g received a roll up update fixing various security issues: * Build option no-ssl3 is incomplete (CVE-2014-3568) * Add support for TLS_FALLBACK_SCSV (CVE-2014-3566) * Information leak in pretty printing functions (CVE-2014-3508) * OCSP bad key DoS attack (CVE-2013-0166) * SSL/TLS CBC plaintext recovery attack (CVE-2013-0169) * Anonymous ECDH denial of service (CVE-2014-3470) * SSL/TLS MITM vulnerability (CVE-2014-0224) Security Issues: * CVE-2013-0166 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166> * CVE-2013-0169 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169> * CVE-2014-0224 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224> * CVE-2014-3470 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470> * CVE-2014-3508 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508> * CVE-2014-3566 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566> * CVE-2014-3568 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1557-2 CVE-2013-0166 CVE-2013-0169 CVE-2014-0224 CVE-2014-3470 CVE-2014-3508 CVE-2014-3566 CVE-2014-3568 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Desktop 11 | Product(s): | compat-openssl097g |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28223 | |||
Oval ID: | oval:org.mitre.oval:def:28223 | ||
Title: | SUSE-SU-2014:1386-1 -- Security update for OpenSSL (important) | ||
Description: | This OpenSSL update fixes the following issues: * Session Ticket Memory Leak (CVE-2014-3567) * Build option no-ssl3 is incomplete ((CVE-2014-3568) * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE) Security Issues: * CVE-2014-3513 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513> * CVE-2014-3567 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567> * CVE-2014-3566 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566> * CVE-2014-3568 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1386-1 CVE-2014-3513 CVE-2014-3567 CVE-2014-3566 CVE-2014-3568 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28380 | |||
Oval ID: | oval:org.mitre.oval:def:28380 | ||
Title: | SUSE-SU-2014:1361-1 -- Security update for OpenSSL (important) | ||
Description: | This OpenSSL update fixes the following issues: * Session Ticket Memory Leak (CVE-2014-3567) * Build option no-ssl3 is incomplete (CVE-2014-3568) * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE) Security Issues: * CVE-2014-3567 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567> * CVE-2014-3566 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566> * CVE-2014-3568 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1361-1 CVE-2014-3567 CVE-2014-3566 CVE-2014-3568 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28457 | |||
Oval ID: | oval:org.mitre.oval:def:28457 | ||
Title: | SUSE-SU-2014:1387-1 -- Security update for OpenSSL (important) | ||
Description: | This OpenSSL update fixes the following issues: * Session Ticket Memory Leak (CVE-2014-3567) * Build option no-ssl3 is incomplete ((CVE-2014-3568) * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE) Security Issues: * CVE-2014-3567 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567> * CVE-2014-3566 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566> * CVE-2014-3568 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1387-1 CVE-2014-3567 CVE-2014-3566 CVE-2014-3568 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 10 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-07-16 | IAVM : 2015-A-0154 - Multiple Vulnerabilities in Oracle Fusion Middleware Severity : Category I - VMSKEY : V0061081 |
2015-02-05 | IAVM : 2015-B-0014 - Multiple Vulnerabilities in VMware ESXi 5.5 Severity : Category I - VMSKEY : V0058513 |
2015-02-05 | IAVM : 2015-B-0013 - Multiple Vulnerabilities in VMware ESXi 5.1 Severity : Category I - VMSKEY : V0058515 |
2015-02-05 | IAVM : 2015-B-0012 - Multiple Vulnerabilities in VMware ESXi 5.0 Severity : Category I - VMSKEY : V0058517 |
2015-01-22 | IAVM : 2015-B-0007 - Multiple Vulnerabilities in Juniper Secure Analytics (JSA) and Security Threa... Severity : Category I - VMSKEY : V0058213 |
2014-05-01 | IAVM : 2014-A-0062 - Multiple Vulnerabilities In McAfee Email Gateway Severity : Category I - VMSKEY : V0050005 |
2014-04-24 | IAVM : 2014-B-0046 - Multiple Vulnerabilities in HP System Management Homepage (SMH) Severity : Category I - VMSKEY : V0049737 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-10-10 | OpenSSL DTLS SRTP extension parsing denial-of-service attempt RuleID : 51460 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL TLS anomalous ascii client session ticket RuleID : 51354 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL TLS anomalous ascii client session ticket RuleID : 51353 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL TLS anomalous ascii client session ticket RuleID : 51352 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL TLS anomalous ascii client session ticket RuleID : 51351 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL TLS anomalous ascii session ticket RuleID : 51350 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL TLS anomalous ascii session ticket RuleID : 51349 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL TLS anomalous ascii session ticket RuleID : 51348 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL TLS anomalous ascii session ticket RuleID : 51347 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL TLS anomalous non-zero length session ticket in client hello RuleID : 51346 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL TLS anomalous non-zero length session ticket in client hello RuleID : 51345 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL TLS anomalous non-zero length session ticket in client hello RuleID : 51344 - Revision : 1 - Type : SERVER-OTHER |
2019-10-01 | OpenSSL TLS anomalous non-zero length session ticket in client hello RuleID : 51343 - Revision : 1 - Type : SERVER-OTHER |
2019-09-24 | OpenSSL DTLS zero-length fragments denial of service attempt RuleID : 51215 - Revision : 1 - Type : SERVER-OTHER |
2019-09-24 | OpenSSL DTLS bad fragment length denial of service attempt RuleID : 51214 - Revision : 2 - Type : SERVER-OTHER |
2016-05-19 | OpenSSL TLS change cipher spec protocol denial of service attempt RuleID : 38575 - Revision : 4 - Type : SERVER-OTHER |
2015-10-20 | OpenSSL DTLS handshake oversized fragment length denial of service attempt RuleID : 36096 - Revision : 2 - Type : SERVER-OTHER |
2015-03-24 | OpenSSL fragmented protocol downgrade attempt RuleID : 33561 - Revision : 2 - Type : SERVER-OTHER |
2014-12-11 | OpenSSL TLS large number of session tickets sent - possible dos attempt RuleID : 32468 - Revision : 3 - Type : SERVER-OTHER |
2014-12-11 | OpenSSL TLS large number of session tickets sent - possible dos attempt RuleID : 32467 - Revision : 3 - Type : SERVER-OTHER |
2014-12-11 | OpenSSL TLS large number of session tickets sent - possible dos attempt RuleID : 32466 - Revision : 3 - Type : SERVER-OTHER |
2014-12-11 | OpenSSL TLS large number of session tickets sent - possible dos attempt RuleID : 32465 - Revision : 3 - Type : SERVER-OTHER |
2014-12-09 | OpenSSL DTLS SRTP extension parsing denial-of-service attempt RuleID : 32382 - Revision : 6 - Type : SERVER-OTHER |
2014-12-09 | OpenSSL DTLS SRTP extension parsing denial-of-service attempt RuleID : 32381 - Revision : 7 - Type : SERVER-OTHER |
2014-11-19 | SSLv3 POODLE CBC padding brute force attempt RuleID : 32205 - Revision : 5 - Type : SERVER-OTHER |
2014-11-19 | SSLv3 POODLE CBC padding brute force attempt RuleID : 32204 - Revision : 5 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-04 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-294.nasl - Type : ACT_GATHER_INFO |
2015-10-02 | Name : The remote Mac OS X host has an application installed that is affected by mul... File : macosx_xcode_7_0.nasl - Type : ACT_GATHER_INFO |
2015-09-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0197.nasl - Type : ACT_GATHER_INFO |
2015-08-03 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_4_1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1387-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1512-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1524-1.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-062.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-33.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-81.nasl - Type : ACT_GATHER_INFO |
2015-03-12 | Name : The remote host has software installed that is affected by multiple vulnerabi... File : ibm_rational_clearquest_8_0_1_6.nasl - Type : ACT_GATHER_INFO |
2015-03-05 | Name : The remote Apache Tomcat server is affected by multiple vulnerabilities. File : tomcat_6_0_43.nasl - Type : ACT_GATHER_INFO |
2015-03-05 | Name : The remote Apache Tomcat server is affected by multiple vulnerabilities. File : tomcat_7_0_57.nasl - Type : ACT_GATHER_INFO |
2015-03-05 | Name : The remote Apache Tomcat server is affected by multiple vulnerabilities. File : tomcat_8_0_15.nasl - Type : ACT_GATHER_INFO |
2015-02-06 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2015-0126.nasl - Type : ACT_GATHER_INFO |
2015-02-03 | Name : The remote host has a virtualization management application installed that is... File : vmware_vcenter_vmsa-2015-0001.nasl - Type : ACT_GATHER_INFO |
2015-01-29 | Name : The remote host is missing a Mac OS X update that fixes multiple vulnerabilit... File : macosx_10_10_2.nasl - Type : ACT_GATHER_INFO |
2015-01-29 | Name : The remote host is missing a Mac OS X update that fixes multiple security iss... File : macosx_SecUpd2015-001.nasl - Type : ACT_GATHER_INFO |
2015-01-29 | Name : The remote VMware ESXi host is missing one or more security-related patches. File : vmware_VMSA-2015-0001.nasl - Type : ACT_GATHER_INFO |
2015-01-29 | Name : The remote VMware ESXi 5.5 host is affected by multiple vulnerabilities. File : vmware_esxi_5_5_build_2352327_remote.nasl - Type : ACT_GATHER_INFO |
2015-01-22 | Name : The remote host has a version of Oracle Secure Global Desktop that is affecte... File : oracle_secure_global_desktop_jan_2015_cpu.nasl - Type : ACT_GATHER_INFO |
2015-01-21 | Name : A clustered file system on the remote host is affected by multiple vulnerabil... File : ibm_gpfs_isg3T1021546_windows.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_openssl_20140623.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_openssl_20140731.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_openssl_20140915.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_openssl_20141014_2.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_openssl_20141104.nasl - Type : ACT_GATHER_INFO |
2015-01-13 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2015-469.nasl - Type : ACT_GATHER_INFO |
2015-01-02 | Name : The remote Fedora host is missing a security update. File : fedora_2014-17576.nasl - Type : ACT_GATHER_INFO |
2015-01-02 | Name : The remote Fedora host is missing a security update. File : fedora_2014-17587.nasl - Type : ACT_GATHER_INFO |
2014-12-30 | Name : The remote application is affected by multiple denial of service vulnerabilit... File : securitycenter_openssl_1_0_1j.nasl - Type : ACT_GATHER_INFO |
2014-12-29 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15722.nasl - Type : ACT_GATHER_INFO |
2014-12-29 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15723.nasl - Type : ACT_GATHER_INFO |
2014-12-26 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-39.nasl - Type : ACT_GATHER_INFO |
2014-12-05 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_compat-openssl097g-141202.nasl - Type : ACT_GATHER_INFO |
2014-12-04 | Name : The remote web server contains an application that is affected by multiple vu... File : splunk_5011.nasl - Type : ACT_GATHER_INFO |
2014-12-04 | Name : The remote web server contains an application that is affected by multiple vu... File : splunk_606.nasl - Type : ACT_GATHER_INFO |
2014-12-04 | Name : The remote web server contains an application that is affected by multiple vu... File : splunk_607.nasl - Type : ACT_GATHER_INFO |
2014-12-04 | Name : The remote web server contains an application that is affected by multiple vu... File : splunk_614.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2014-0012.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2014-0032.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2014-0039.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2014-0040.nasl - Type : ACT_GATHER_INFO |
2014-11-17 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-671.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote host has an application installed that is affected by multiple vul... File : vmware_vcenter_converter_2014-0010.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0041.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0416.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1054.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1692.nasl - Type : ACT_GATHER_INFO |
2014-11-06 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libopenssl-devel-141024.nasl - Type : ACT_GATHER_INFO |
2014-10-31 | Name : The remote AIX host has a version of OpenSSL installed that is affected by mu... File : aix_openssl_advisory11.nasl - Type : ACT_GATHER_INFO |
2014-10-30 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-605.nasl - Type : ACT_GATHER_INFO |
2014-10-24 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-203.nasl - Type : ACT_GATHER_INFO |
2014-10-20 | Name : The remote Windows host contains a program that is affected by multiple vulne... File : stunnel_5_06.nasl - Type : ACT_GATHER_INFO |
2014-10-17 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1652.nasl - Type : ACT_GATHER_INFO |
2014-10-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3053.nasl - Type : ACT_GATHER_INFO |
2014-10-17 | Name : The remote service is affected by multiple vulnerabilities. File : openssl_0_9_8zc.nasl - Type : ACT_GATHER_INFO |
2014-10-17 | Name : The remote service is affected by multiple vulnerabilities. File : openssl_1_0_0o.nasl - Type : ACT_GATHER_INFO |
2014-10-17 | Name : The remote service is affected by multiple vulnerabilities. File : openssl_1_0_1j.nasl - Type : ACT_GATHER_INFO |
2014-10-17 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1652.nasl - Type : ACT_GATHER_INFO |
2014-10-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1652.nasl - Type : ACT_GATHER_INFO |
2014-10-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20141016_openssl_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-10-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2385-1.nasl - Type : ACT_GATHER_INFO |
2014-10-16 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2014-288-01.nasl - Type : ACT_GATHER_INFO |
2014-10-16 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-427.nasl - Type : ACT_GATHER_INFO |
2014-10-16 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_03175e62549411e49cc1bc5ff4fb5e7b.nasl - Type : ACT_GATHER_INFO |
2014-10-14 | Name : The remote device is missing a vendor-supplied security patch. File : juniper_jsa10649.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-391.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15147.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15158.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15564.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15568.nasl - Type : ACT_GATHER_INFO |
2014-10-07 | Name : The remote Windows host has an application installed that is affected by mult... File : winscp_5_5_5.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote AIX host has a version of OpenSSL installed that is affected by mu... File : aix_openssl_advisory10.nasl - Type : ACT_GATHER_INFO |
2014-08-22 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-509.nasl - Type : ACT_GATHER_INFO |
2014-08-21 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libopenssl-devel-140812.nasl - Type : ACT_GATHER_INFO |
2014-08-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140813_openssl_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-08-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140813_openssl_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-08-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1052.nasl - Type : ACT_GATHER_INFO |
2014-08-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1053.nasl - Type : ACT_GATHER_INFO |
2014-08-14 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1052.nasl - Type : ACT_GATHER_INFO |
2014-08-14 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1053.nasl - Type : ACT_GATHER_INFO |
2014-08-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1052.nasl - Type : ACT_GATHER_INFO |
2014-08-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1053.nasl - Type : ACT_GATHER_INFO |
2014-08-13 | Name : The remote Windows host contains a program that is affected by multiple vulne... File : stunnel_5_03.nasl - Type : ACT_GATHER_INFO |
2014-08-10 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9301.nasl - Type : ACT_GATHER_INFO |
2014-08-10 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9308.nasl - Type : ACT_GATHER_INFO |
2014-08-09 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2014-220-01.nasl - Type : ACT_GATHER_INFO |
2014-08-09 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-158.nasl - Type : ACT_GATHER_INFO |
2014-08-08 | Name : The remote service is affected by multiple vulnerabilities. File : openssl_0_9_8zb.nasl - Type : ACT_GATHER_INFO |
2014-08-08 | Name : The remote service is affected by multiple vulnerabilities. File : openssl_1_0_0n.nasl - Type : ACT_GATHER_INFO |
2014-08-08 | Name : The remote service is affected by multiple vulnerabilities. File : openssl_1_0_1i.nasl - Type : ACT_GATHER_INFO |
2014-08-08 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2308-1.nasl - Type : ACT_GATHER_INFO |
2014-08-07 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2998.nasl - Type : ACT_GATHER_INFO |
2014-08-07 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_8aff07eb1dbd11e4b6ba3c970e169bc2.nasl - Type : ACT_GATHER_INFO |
2014-07-15 | Name : The remote host contains an application that is affected by an information di... File : libreoffice_423.nasl - Type : ACT_GATHER_INFO |
2014-07-15 | Name : The remote host contains an application that is affected by an information di... File : macosx_libreoffice_423.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-10.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-11.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-27.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-4.nasl - Type : ACT_GATHER_INFO |
2014-04-18 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_3_2.nasl - Type : ACT_GATHER_INFO |
2014-04-16 | Name : The remote AIX host is running a vulnerable version of OpenSSL. File : aix_openssl_advisory6.nasl - Type : ACT_GATHER_INFO |
2014-03-21 | Name : A web application on the remote host is affected by a denial of service vulne... File : puppet_enterprise_312.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-273.nasl - Type : ACT_GATHER_INFO |
2014-02-04 | Name : The remote Fedora host is missing a security update. File : fedora_2014-1560.nasl - Type : ACT_GATHER_INFO |
2014-01-28 | Name : The remote Fedora host is missing a security update. File : fedora_2014-1567.nasl - Type : ACT_GATHER_INFO |
2014-01-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-007.nasl - Type : ACT_GATHER_INFO |
2014-01-14 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2014-013-02.nasl - Type : ACT_GATHER_INFO |
2014-01-13 | Name : The remote Fedora host is missing a security update. File : fedora_2014-0474.nasl - Type : ACT_GATHER_INFO |
2014-01-12 | Name : The remote Fedora host is missing a security update. File : fedora_2014-0456.nasl - Type : ACT_GATHER_INFO |
2014-01-12 | Name : The remote Fedora host is missing a security update. File : fedora_2014-0476.nasl - Type : ACT_GATHER_INFO |
2014-01-10 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140108_openssl_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-01-10 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2079-1.nasl - Type : ACT_GATHER_INFO |
2014-01-09 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0015.nasl - Type : ACT_GATHER_INFO |
2014-01-09 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0015.nasl - Type : ACT_GATHER_INFO |
2014-01-09 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0015.nasl - Type : ACT_GATHER_INFO |
2014-01-08 | Name : The remote host may be affected by a security bypass vulnerability. File : openssl_1_0_0l.nasl - Type : ACT_GATHER_INFO |
2014-01-08 | Name : The remote service may be affected by multiple vulnerabilities. File : openssl_1_0_1f.nasl - Type : ACT_GATHER_INFO |
2014-01-07 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_5aaa257e772d11e3a65a3c970e169bc2.nasl - Type : ACT_GATHER_INFO |
2014-01-02 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2833.nasl - Type : ACT_GATHER_INFO |
2013-12-23 | Name : The remote Fedora host is missing a security update. File : fedora_2013-23768.nasl - Type : ACT_GATHER_INFO |
2013-12-23 | Name : The remote Fedora host is missing a security update. File : fedora_2013-23788.nasl - Type : ACT_GATHER_INFO |
2013-12-23 | Name : The remote Fedora host is missing a security update. File : fedora_2013-23794.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-12-27 13:25:16 |
|
2014-12-26 05:26:57 |
|