vendor:
OpenSSL
by:
Jared Stafford
7,5
CVSS
HIGH
Heartbleed
119
CWE
Product Name: OpenSSL
Affected Version From: OpenSSL 1.0.1 to 1.0.1f
Affected Version To: OpenSSL 1.0.1 to 1.0.1f
Patch Exists: YES
Related CWE: CVE-2014-0160
CPE: a:openssl:openssl
Metasploit:
https://www.rapid7.com/db/vulnerabilities/ibm-was-cve-2014-0964/, https://www.rapid7.com/db/vulnerabilities/hp-ilo-cve-2014-2601/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2014-0376/, https://www.rapid7.com/db/vulnerabilities/http-openssl-cve-2014-0160/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2014-0378/, https://www.rapid7.com/db/vulnerabilities/vmsa-2014-0004-cve-2014-0160/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2014-0160/, https://www.rapid7.com/db/vulnerabilities/pulse-secure-pulse-connect-secure-cve-2014-0160/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2014-0160/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2014-0396/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2014-0160/, https://www.rapid7.com/db/vulnerabilities/hpsmh-cve-2014-0160/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-0160/, https://www.rapid7.com/db/vulnerabilities/vmsa-2014-0004-cve-2014-0160-workstation/, https://www.rapid7.com/db/vulnerabilities/hpsim-cve-2014-0160/, https://www.rapid7.com/db/vulnerabilities/cisco-anyconnect-cve-2014-0160/, https://www.rapid7.com/db/vulnerabilities/vmsa-2014-0004-cve-2014-0160-fusion/, https://www.rapid7.com/db/vulnerabilities/juniper-junos-os-jsa10623/, https://www.rapid7.com/db/vulnerabilities/vmsa-2014-0004-cve-2014-0160-player/, https://www.rapid7.com/db/vulnerabilities/hp-ilo-cve-2014-0160/, https://www.rapid7.com/db/?q=CVE-2014-0160&type=&page=2, https://www.rapid7.com/db/?q=CVE-2014-0160&type=&page=2
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Windows, Mac
2014
CVE-2014-0160
Heartbleed is a security bug in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. It was introduced into the software in 2012 and publicly disclosed in April 2014. Heartbleed may be exploited regardless of whether the parties have enabled or even support TLS. It results from a missing bounds check in the handling of the TLS heartbeat extension, which in turn leads to a buffer over-read. This allows attackers to read up to 64kB of memory from the server.
Mitigation:
The vulnerability can be mitigated by upgrading to OpenSSL 1.0.1g or later. Additionally, the vulnerable code can be removed from the OpenSSL source code tree.