First published: Mon Apr 07 2014(Updated: )
The TLS and DTLS implementations in OpenSSL do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
OpenSSL libcrypto | ||
OpenSSL libcrypto | >=1.0.1<1.0.1g | |
FileZilla Server | <0.9.44 | |
Siemens Application Processing Engine | =2.0 | |
Siemens Application Processing Engine | ||
Siemens CP 1543-1 | =1.1 | |
Siemens CP 1543-1 | ||
Siemens S7-1500 Firmware | =1.5 | |
Siemens Simatic S7-1500 | ||
siemens simatic s7-1500t firmware | =1.5 | |
Siemens Simatic S7-1500 | ||
Siemens Elan 8.2 | <8.3.3 | |
Siemens SIMATIC WinCC Open Architecture V3.18 | =3.12 | |
Intellian v100 | =1.20 | |
Intellian v100 | =1.21 | |
Intellian v100 | =1.24 | |
Intellian v100 | ||
Intellian v60 | =1.15 | |
Intellian v60 | =1.25 | |
Intelliantech v60 firmware | ||
Mitel MiCollab | =6.0 | |
Mitel MiCollab | =7.0 | |
Mitel MiCollab | =7.1 | |
Mitel MiCollab | =7.2 | |
Mitel MiCollab | =7.3 | |
Mitel MiCollab | =7.3.0.104 | |
Mitel MiVoice Lync | =1.1.2.5 | |
Mitel MiVoice Skype for Business | =1.1.3.3 | |
Mitel MiVoice Skype for Business | =1.2.0.11 | |
Mitel MiVoice Skype for Business | =1.3.2.2 | |
Mitel MiVoice Skype for Business | =1.4.0.102 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 | |
Fedoraproject Fedora | =19 | |
Fedoraproject Fedora | =20 | |
redhat gluster storage | =2.1 | |
Red Hat Storage | =2.1 | |
Red Hat Enterprise Virtualization | =6.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server aus | =6.5 | |
redhat enterprise Linux server eus | =6.5 | |
redhat enterprise Linux server tus | =6.5 | |
redhat enterprise Linux workstation | =6.0 | |
Debian GNU/Linux | =6.0 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Riconmobile S9922L | =16.10.3\(3794\) | |
Riconmobile S9922L | =1.0 | |
All of | ||
Siemens Application Processing Engine | =2.0 | |
Siemens Application Processing Engine | ||
All of | ||
Siemens CP 1543-1 | =1.1 | |
Siemens CP 1543-1 | ||
All of | ||
Siemens S7-1500 Firmware | =1.5 | |
Siemens Simatic S7-1500 | ||
All of | ||
siemens simatic s7-1500t firmware | =1.5 | |
Siemens Simatic S7-1500 | ||
All of | ||
Any of | ||
Intellian v100 | =1.20 | |
Intellian v100 | =1.21 | |
Intellian v100 | =1.24 | |
Intellian v100 | ||
All of | ||
Any of | ||
Intellian v60 | =1.15 | |
Intellian v60 | =1.25 | |
Intelliantech v60 firmware | ||
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Fedora | =19 | |
Fedora | =20 | |
GlusterFS | =2.1 | |
Debian | =6.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
All of | ||
Riconmobile S9922L | =16.10.3\(3794\) | |
Riconmobile S9922L | =1.0 | |
Broadcom Symantec Messaging Gateway | =10.6.0 | |
Broadcom Symantec Messaging Gateway | =10.6.1 | |
Splunk Splunk | >=6.0.0<6.0.3 |
http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96db9023b881d7cd9f379b0c154650d6c108e9a3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0160 is rated as critical due to its potential to leak sensitive information from the affected system.
To fix CVE-2014-0160, upgrade OpenSSL to version 1.0.1g or higher as all versions prior to this are vulnerable.
CVE-2014-0160 affects OpenSSL versions prior to 1.0.1g, along with various applications that utilize this vulnerable library.
Yes, CVE-2014-0160 can be exploited remotely by attackers using specially crafted Heartbeat packets to extract sensitive information.
While CVE-2014-0160 primarily affects OpenSSL, it can also impact other applications and platforms that use vulnerable versions of the library.