Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-0198

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-06 May, 2014 | 10:00
Updated At-06 Aug, 2024 | 09:05
Rejected At-
Credits

The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:06 May, 2014 | 10:00
Updated At:06 Aug, 2024 | 09:05
Rejected At:
▼CVE Numbering Authority (CNA)

The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/59342
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59669
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59525
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59282
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59990
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59264
third-party-advisory
x_refsource_SECUNIA
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.html
x_refsource_CONFIRM
http://secunia.com/advisories/59126
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/67193
vdb-entry
x_refsource_BID
http://secunia.com/advisories/59306
third-party-advisory
x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=1093837
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=140544599631400&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/59190
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59529
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
x_refsource_CONFIRM
http://secunia.com/advisories/61254
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21676655
x_refsource_CONFIRM
http://puppetlabs.com/security/cve/cve-2014-0198
x_refsource_CONFIRM
http://secunia.com/advisories/59449
third-party-advisory
x_refsource_SECUNIA
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21676879
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21677828
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=140621259019789&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/59300
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/58667
third-party-advisory
x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201407-05.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/59284
third-party-advisory
x_refsource_SECUNIA
http://www.ibm.com/support/docview.wss?uid=swg24037783
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21677695
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21676529
x_refsource_CONFIRM
http://advisories.mageia.org/MGASA-2014-0204.html
x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/534161/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21676889
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/58945
third-party-advisory
x_refsource_SECUNIA
http://www.openbsd.org/errata55.html#005_openssl
vendor-advisory
x_refsource_OPENBSD
http://secunia.com/advisories/59440
third-party-advisory
x_refsource_SECUNIA
https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321
x_refsource_CONFIRM
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
x_refsource_CONFIRM
http://secunia.com/advisories/59655
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59163
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2014/dsa-2931
vendor-advisory
x_refsource_DEBIAN
http://www-01.ibm.com/support/docview.wss?uid=swg21677836
x_refsource_CONFIRM
http://secunia.com/advisories/59437
third-party-advisory
x_refsource_SECUNIA
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
x_refsource_CONFIRM
http://secunia.com/advisories/59374
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/security/advisories/VMSA-2014-0006.html
x_refsource_CONFIRM
http://secunia.com/advisories/59310
third-party-advisory
x_refsource_SECUNIA
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
x_refsource_CONFIRM
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
x_refsource_CONFIRM
http://www.fortiguard.com/advisory/FG-IR-14-018/
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
vendor-advisory
x_refsource_SUSE
http://www.ibm.com/support/docview.wss?uid=swg21676356
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=140389274407904&w=2
vendor-advisory
x_refsource_HP
http://support.citrix.com/article/CTX140876
x_refsource_CONFIRM
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
x_refsource_CONFIRM
http://secunia.com/advisories/58939
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59514
third-party-advisory
x_refsource_SECUNIA
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
vendor-advisory
x_refsource_CISCO
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
x_refsource_CONFIRM
https://kc.mcafee.com/corporate/index?page=content&id=SB10075
x_refsource_CONFIRM
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21676419
x_refsource_CONFIRM
http://secunia.com/advisories/59438
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/58714
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141658880509699&w=2
vendor-advisory
x_refsource_HP
http://www.openssl.org/news/secadv_20140605.txt
x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2014/Dec/23
mailing-list
x_refsource_FULLDISC
http://secunia.com/advisories/60066
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59301
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-05/msg00036.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/59784
third-party-advisory
x_refsource_SECUNIA
https://kb.bluecoat.com/index?page=content&id=SA80
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=140904544427729&w=2
vendor-advisory
x_refsource_HP
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21678167
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
vendor-advisory
x_refsource_FEDORA
http://marc.info/?l=bugtraq&m=140752315422991&w=2
vendor-advisory
x_refsource_HP
http://www.mandriva.com/security/advisories?name=MDVSA-2014:080
vendor-advisory
x_refsource_MANDRIVA
http://marc.info/?l=bugtraq&m=140389355508263&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=140448122410568&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/59666
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=140431828824371&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/59413
third-party-advisory
x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
x_refsource_CONFIRM
http://secunia.com/advisories/59721
third-party-advisory
x_refsource_SECUNIA
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21676062
x_refsource_CONFIRM
http://secunia.com/advisories/58713
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21673137
x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
vendor-advisory
x_refsource_MANDRIVA
http://www-01.ibm.com/support/docview.wss?uid=swg21676035
x_refsource_CONFIRM
http://secunia.com/advisories/59450
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59287
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21683332
x_refsource_CONFIRM
http://secunia.com/advisories/59491
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/58977
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-05/msg00037.html
vendor-advisory
x_refsource_SUSE
https://www.novell.com/support/kb/doc.php?id=7015271
x_refsource_CONFIRM
http://secunia.com/advisories/60571
third-party-advisory
x_refsource_SECUNIA
http://www.blackberry.com/btsc/KB36051
x_refsource_CONFIRM
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
x_refsource_CONFIRM
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21677527
x_refsource_CONFIRM
http://secunia.com/advisories/59202
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/58337
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59162
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59398
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59490
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60049
third-party-advisory
x_refsource_SECUNIA
https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59342
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59669
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59525
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59282
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59990
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59264
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59126
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/67193
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/advisories/59306
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1093837
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=140544599631400&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/59190
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59529
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61254
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676655
Resource:
x_refsource_CONFIRM
Hyperlink: http://puppetlabs.com/security/cve/cve-2014-0198
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59449
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676879
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677828
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=140621259019789&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/59300
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/58667
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://security.gentoo.org/glsa/glsa-201407-05.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/59284
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ibm.com/support/docview.wss?uid=swg24037783
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677695
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676529
Resource:
x_refsource_CONFIRM
Hyperlink: http://advisories.mageia.org/MGASA-2014-0204.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/archive/1/534161/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676889
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/58945
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.openbsd.org/errata55.html#005_openssl
Resource:
vendor-advisory
x_refsource_OPENBSD
Hyperlink: http://secunia.com/advisories/59440
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59655
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59163
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2014/dsa-2931
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677836
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59437
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59374
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0006.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59310
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.fortiguard.com/advisory/FG-IR-14-018/
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.ibm.com/support/docview.wss?uid=swg21676356
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=140389274407904&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://support.citrix.com/article/CTX140876
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/58939
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59514
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
Resource:
x_refsource_CONFIRM
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10075
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676419
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59438
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/58714
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141658880509699&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.openssl.org/news/secadv_20140605.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://seclists.org/fulldisclosure/2014/Dec/23
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://secunia.com/advisories/60066
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59301
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-05/msg00036.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/59784
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA80
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=140904544427729&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21678167
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://marc.info/?l=bugtraq&m=140752315422991&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2014:080
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://marc.info/?l=bugtraq&m=140389355508263&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=140448122410568&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/59666
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=140431828824371&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/59413
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59721
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676062
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/58713
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21673137
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676035
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59450
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59287
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21683332
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59491
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/58977
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-05/msg00037.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://www.novell.com/support/kb/doc.php?id=7015271
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60571
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.blackberry.com/btsc/KB36051
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677527
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/59202
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/58337
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59162
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59398
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59490
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60049
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/59342
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59669
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59525
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59282
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59990
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59264
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59126
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/67193
vdb-entry
x_refsource_BID
x_transferred
http://secunia.com/advisories/59306
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=1093837
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=140544599631400&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/59190
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59529
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61254
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21676655
x_refsource_CONFIRM
x_transferred
http://puppetlabs.com/security/cve/cve-2014-0198
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59449
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21676879
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21677828
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=140621259019789&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/59300
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/58667
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://security.gentoo.org/glsa/glsa-201407-05.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/59284
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ibm.com/support/docview.wss?uid=swg24037783
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21677695
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21676529
x_refsource_CONFIRM
x_transferred
http://advisories.mageia.org/MGASA-2014-0204.html
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/archive/1/534161/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21676889
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/58945
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.openbsd.org/errata55.html#005_openssl
vendor-advisory
x_refsource_OPENBSD
x_transferred
http://secunia.com/advisories/59440
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59655
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59163
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2014/dsa-2931
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21677836
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59437
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59374
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/security/advisories/VMSA-2014-0006.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59310
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
x_refsource_CONFIRM
x_transferred
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
x_refsource_CONFIRM
x_transferred
http://www.fortiguard.com/advisory/FG-IR-14-018/
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.ibm.com/support/docview.wss?uid=swg21676356
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=140389274407904&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://support.citrix.com/article/CTX140876
x_refsource_CONFIRM
x_transferred
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/58939
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59514
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
vendor-advisory
x_refsource_CISCO
x_transferred
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
x_refsource_CONFIRM
x_transferred
https://kc.mcafee.com/corporate/index?page=content&id=SB10075
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21676419
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59438
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/58714
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141658880509699&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.openssl.org/news/secadv_20140605.txt
x_refsource_CONFIRM
x_transferred
http://seclists.org/fulldisclosure/2014/Dec/23
mailing-list
x_refsource_FULLDISC
x_transferred
http://secunia.com/advisories/60066
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59301
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-updates/2014-05/msg00036.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/59784
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://kb.bluecoat.com/index?page=content&id=SA80
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=140904544427729&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21678167
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://marc.info/?l=bugtraq&m=140752315422991&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2014:080
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://marc.info/?l=bugtraq&m=140389355508263&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=140448122410568&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/59666
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=140431828824371&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/59413
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59721
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21676062
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/58713
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21673137
x_refsource_CONFIRM
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21676035
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59450
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59287
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21683332
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59491
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/58977
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-updates/2014-05/msg00037.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://www.novell.com/support/kb/doc.php?id=7015271
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60571
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.blackberry.com/btsc/KB36051
x_refsource_CONFIRM
x_transferred
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
x_refsource_CONFIRM
x_transferred
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21677527
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59202
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/58337
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59162
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59398
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59490
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60049
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59342
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59669
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59525
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59282
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59990
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59264
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59126
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/67193
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/advisories/59306
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1093837
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=140544599631400&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/59190
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59529
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61254
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676655
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://puppetlabs.com/security/cve/cve-2014-0198
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59449
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676879
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677828
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=140621259019789&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/59300
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/58667
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-201407-05.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/59284
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=swg24037783
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677695
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676529
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://advisories.mageia.org/MGASA-2014-0204.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/534161/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676889
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/58945
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.openbsd.org/errata55.html#005_openssl
Resource:
vendor-advisory
x_refsource_OPENBSD
x_transferred
Hyperlink: http://secunia.com/advisories/59440
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59655
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59163
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2014/dsa-2931
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677836
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59437
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59374
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0006.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59310
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.fortiguard.com/advisory/FG-IR-14-018/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=swg21676356
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=140389274407904&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://support.citrix.com/article/CTX140876
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/58939
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59514
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10075
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676419
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59438
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/58714
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141658880509699&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.openssl.org/news/secadv_20140605.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2014/Dec/23
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://secunia.com/advisories/60066
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59301
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-05/msg00036.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/59784
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA80
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=140904544427729&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21678167
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=140752315422991&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2014:080
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=140389355508263&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=140448122410568&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/59666
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=140431828824371&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/59413
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59721
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676062
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/58713
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21673137
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676035
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59450
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59287
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21683332
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59491
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/58977
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-05/msg00037.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://www.novell.com/support/kb/doc.php?id=7015271
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60571
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.blackberry.com/btsc/KB36051
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677527
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/59202
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/58337
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59162
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59398
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59490
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60049
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:06 May, 2014 | 10:44
Updated At:12 Apr, 2025 | 10:46

The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CPE Matches

OpenSSL
openssl
>>openssl>>Versions from 1.0.0(inclusive) to 1.0.1g(inclusive)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
MariaDB Foundation
mariadb
>>mariadb>>Versions from 10.0.0(inclusive) to 10.0.13(exclusive)
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>19
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>20
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>6.0
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>7.0
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>8.0
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
openSUSE
opensuse
>>opensuse>>12.3
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
openSUSE
opensuse
>>opensuse>>13.1
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
SUSE
suse
>>linux_enterprise_desktop>>12
cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
SUSE
suse
>>linux_enterprise_server>>12
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
SUSE
suse
>>linux_enterprise_software_development_kit>>12
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
SUSE
suse
>>linux_enterprise_workstation_extension>>12
cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-476Primarynvd@nist.gov
CWE ID: CWE-476
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://advisories.mageia.org/MGASA-2014-0204.htmlsecalert@redhat.com
Third Party Advisory
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.ascsecalert@redhat.com
Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629secalert@redhat.com
Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195secalert@redhat.com
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmlsecalert@redhat.com
Mailing List
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlsecalert@redhat.com
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.htmlsecalert@redhat.com
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-05/msg00036.htmlsecalert@redhat.com
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-05/msg00037.htmlsecalert@redhat.com
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140389274407904&w=2secalert@redhat.com
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140389355508263&w=2secalert@redhat.com
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140431828824371&w=2secalert@redhat.com
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140448122410568&w=2secalert@redhat.com
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140544599631400&w=2secalert@redhat.com
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140621259019789&w=2secalert@redhat.com
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140752315422991&w=2secalert@redhat.com
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140904544427729&w=2secalert@redhat.com
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=141658880509699&w=2secalert@redhat.com
Mailing List
Third Party Advisory
http://puppetlabs.com/security/cve/cve-2014-0198secalert@redhat.com
Third Party Advisory
http://seclists.org/fulldisclosure/2014/Dec/23secalert@redhat.com
Mailing List
Third Party Advisory
http://secunia.com/advisories/58337secalert@redhat.com
Not Applicable
http://secunia.com/advisories/58667secalert@redhat.com
Not Applicable
http://secunia.com/advisories/58713secalert@redhat.com
Not Applicable
http://secunia.com/advisories/58714secalert@redhat.com
Not Applicable
http://secunia.com/advisories/58939secalert@redhat.com
Not Applicable
http://secunia.com/advisories/58945secalert@redhat.com
Not Applicable
http://secunia.com/advisories/58977secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59126secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59162secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59163secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59190secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59202secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59264secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59282secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59284secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59287secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59300secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59301secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59306secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59310secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59342secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59374secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59398secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59413secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59437secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59438secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59440secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59449secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59450secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59490secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59491secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59514secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59525secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59529secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59655secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59666secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59669secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59721secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59784secalert@redhat.com
Not Applicable
http://secunia.com/advisories/59990secalert@redhat.com
Not Applicable
http://secunia.com/advisories/60049secalert@redhat.com
Not Applicable
http://secunia.com/advisories/60066secalert@redhat.com
Not Applicable
http://secunia.com/advisories/60571secalert@redhat.com
Not Applicable
http://secunia.com/advisories/61254secalert@redhat.com
Not Applicable
http://security.gentoo.org/glsa/glsa-201407-05.xmlsecalert@redhat.com
Third Party Advisory
http://support.citrix.com/article/CTX140876secalert@redhat.com
Third Party Advisory
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.htmlsecalert@redhat.com
Third Party Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-opensslsecalert@redhat.com
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163secalert@redhat.com
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21673137secalert@redhat.com
Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676035secalert@redhat.com
Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676062secalert@redhat.com
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676419secalert@redhat.com
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676529secalert@redhat.com
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676655secalert@redhat.com
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676879secalert@redhat.com
Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676889secalert@redhat.com
Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21677527secalert@redhat.com
Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21677695secalert@redhat.com
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677828secalert@redhat.com
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677836secalert@redhat.com
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21678167secalert@redhat.com
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21683332secalert@redhat.com
Third Party Advisory
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754secalert@redhat.com
Broken Link
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755secalert@redhat.com
Broken Link
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756secalert@redhat.com
Broken Link
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757secalert@redhat.com
Broken Link
http://www.blackberry.com/btsc/KB36051secalert@redhat.com
Third Party Advisory
http://www.debian.org/security/2014/dsa-2931secalert@redhat.com
Third Party Advisory
http://www.fortiguard.com/advisory/FG-IR-14-018/secalert@redhat.com
Third Party Advisory
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htmsecalert@redhat.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21676356secalert@redhat.com
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg24037783secalert@redhat.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2014:080secalert@redhat.com
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062secalert@redhat.com
Broken Link
http://www.openbsd.org/errata55.html#005_opensslsecalert@redhat.com
Third Party Advisory
http://www.openssl.org/news/secadv_20140605.txtsecalert@redhat.com
Vendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlsecalert@redhat.com
Patch
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlsecalert@redhat.com
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlsecalert@redhat.com
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlsecalert@redhat.com
Third Party Advisory
http://www.securityfocus.com/archive/1/534161/100/0/threadedsecalert@redhat.com
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/67193secalert@redhat.com
Third Party Advisory
VDB Entry
http://www.vmware.com/security/advisories/VMSA-2014-0006.htmlsecalert@redhat.com
Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2014-0012.htmlsecalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1093837secalert@redhat.com
Issue Tracking
Patch
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdfsecalert@redhat.com
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946secalert@redhat.com
Third Party Advisory
https://kb.bluecoat.com/index?page=content&id=SA80secalert@redhat.com
Broken Link
https://kc.mcafee.com/corporate/index?page=content&id=SB10075secalert@redhat.com
Broken Link
https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321secalert@redhat.com
Broken Link
https://www.novell.com/support/kb/doc.php?id=7015271secalert@redhat.com
Third Party Advisory
http://advisories.mageia.org/MGASA-2014-0204.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.ascaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-05/msg00036.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-05/msg00037.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140389274407904&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140389355508263&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140431828824371&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140448122410568&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140544599631400&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140621259019789&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140752315422991&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=140904544427729&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=141658880509699&w=2af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://puppetlabs.com/security/cve/cve-2014-0198af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://seclists.org/fulldisclosure/2014/Dec/23af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://secunia.com/advisories/58337af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/58667af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/58713af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/58714af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/58939af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/58945af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/58977af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59126af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59162af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59163af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59190af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59202af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59264af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59282af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59284af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59287af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59300af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59301af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59306af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59310af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59342af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59374af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59398af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59413af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59437af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59438af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59440af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59449af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59450af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59490af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59491af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59514af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59525af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59529af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59655af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59666af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59669af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59721af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59784af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/59990af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/60049af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/60066af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/60571af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/61254af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://security.gentoo.org/glsa/glsa-201407-05.xmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.citrix.com/article/CTX140876af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-opensslaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21673137af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676035af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676062af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676419af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676529af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676655af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676879af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676889af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21677527af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21677695af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677828af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677836af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21678167af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21683332af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.blackberry.com/btsc/KB36051af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2014/dsa-2931af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.fortiguard.com/advisory/FG-IR-14-018/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htmaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21676356af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg24037783af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2014:080af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.openbsd.org/errata55.html#005_opensslaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.openssl.org/news/secadv_20140605.txtaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/archive/1/534161/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/67193af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.vmware.com/security/advisories/VMSA-2014-0006.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2014-0012.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1093837af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Patch
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdfaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://kb.bluecoat.com/index?page=content&id=SA80af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://kc.mcafee.com/corporate/index?page=content&id=SB10075af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://www.novell.com/support/kb/doc.php?id=7015271af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: http://advisories.mageia.org/MGASA-2014-0204.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-05/msg00036.html
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-05/msg00037.html
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140389274407904&w=2
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140389355508263&w=2
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140431828824371&w=2
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140448122410568&w=2
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140544599631400&w=2
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140621259019789&w=2
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140752315422991&w=2
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140904544427729&w=2
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=141658880509699&w=2
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://puppetlabs.com/security/cve/cve-2014-0198
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2014/Dec/23
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://secunia.com/advisories/58337
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/58667
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/58713
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/58714
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/58939
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/58945
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/58977
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59126
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59162
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59163
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59190
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59202
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59264
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59282
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59284
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59287
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59300
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59301
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59306
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59310
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59342
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59374
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59398
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59413
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59437
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59438
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59440
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59449
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59450
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59490
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59491
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59514
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59525
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59529
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59655
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59666
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59669
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59721
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59784
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59990
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/60049
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/60066
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/60571
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/61254
Source: secalert@redhat.com
Resource:
Not Applicable
Hyperlink: http://security.gentoo.org/glsa/glsa-201407-05.xml
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://support.citrix.com/article/CTX140876
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21673137
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676035
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676062
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676419
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676529
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676655
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676879
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676889
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677527
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677695
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677828
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677836
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21678167
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21683332
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.blackberry.com/btsc/KB36051
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2014/dsa-2931
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.fortiguard.com/advisory/FG-IR-14-018/
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=swg21676356
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=swg24037783
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2014:080
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.openbsd.org/errata55.html#005_openssl
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.openssl.org/news/secadv_20140605.txt
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Source: secalert@redhat.com
Resource:
Patch
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/archive/1/534161/100/0/threaded
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/67193
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0006.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1093837
Source: secalert@redhat.com
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA80
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10075
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: https://www.novell.com/support/kb/doc.php?id=7015271
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: http://advisories.mageia.org/MGASA-2014-0204.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-05/msg00036.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-05/msg00037.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140389274407904&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140389355508263&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140431828824371&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140448122410568&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140544599631400&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140621259019789&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140752315422991&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=140904544427729&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=141658880509699&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://puppetlabs.com/security/cve/cve-2014-0198
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2014/Dec/23
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://secunia.com/advisories/58337
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/58667
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/58713
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/58714
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/58939
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/58945
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/58977
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59126
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59162
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59163
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59190
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59202
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59264
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59282
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59284
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59287
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59300
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59301
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59306
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59310
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59342
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59374
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59398
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59413
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59437
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59438
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59440
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59449
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59450
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59490
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59491
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59514
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59525
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59529
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59655
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59666
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59669
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59721
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59784
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/59990
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/60049
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/60066
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/60571
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://secunia.com/advisories/61254
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://security.gentoo.org/glsa/glsa-201407-05.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://support.citrix.com/article/CTX140876
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21673137
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676035
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676062
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676419
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676529
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676655
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676879
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21676889
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677527
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677695
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677828
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21677836
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21678167
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21683332
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.blackberry.com/btsc/KB36051
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2014/dsa-2931
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.fortiguard.com/advisory/FG-IR-14-018/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=swg21676356
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.ibm.com/support/docview.wss?uid=swg24037783
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2014:080
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://www.openbsd.org/errata55.html#005_openssl
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.openssl.org/news/secadv_20140605.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/archive/1/534161/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/67193
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1093837
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA80
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10075
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://www.novell.com/support/kb/doc.php?id=7015271
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

1952Records found

CVE-2017-9865
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.76% / 72.36%
||
7 Day CHG~0.00%
Published-25 Jun, 2017 | 13:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The function GfxImageColorMap::getGray in GfxState.cc in Poppler 0.54.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted PDF document, related to missing color-map validation in ImageOutputDev.cc.

Action-Not Available
Vendor-n/afreedesktop.orgDebian GNU/Linux
Product-popplerdebian_linuxn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2017-8846
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.52% / 65.64%
||
7 Day CHG~0.00%
Published-08 May, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The read_stream function in stream.c in liblrzip.so in lrzip 0.631 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted archive.

Action-Not Available
Vendor-long_range_zip_projectn/aDebian GNU/Linux
Product-long_range_zipdebian_linuxn/a
CWE ID-CWE-416
Use After Free
CVE-2014-9670
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-4.29% / 88.41%
||
7 Day CHG~0.00%
Published-08 Feb, 2015 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.

Action-Not Available
Vendor-freetypen/aopenSUSERed Hat, Inc.Fedora ProjectDebian GNU/LinuxOracle CorporationCanonical Ltd.
Product-enterprise_linux_serversolarisenterprise_linux_hpc_nodefedoraopensuseenterprise_linux_hpc_node_eusenterprise_linux_desktopubuntu_linuxenterprise_linux_server_eusfreetypeenterprise_linux_workstationdebian_linuxn/a
CVE-2022-25313
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 33.31%
||
7 Day CHG~0.00%
Published-18 Feb, 2022 | 04:23
Updated-30 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.

Action-Not Available
Vendor-libexpat_projectn/aOracle CorporationDebian GNU/LinuxFedora ProjectSiemens AG
Product-zfs_storage_appliance_kitsinema_remote_connect_serverlibexpatfedoradebian_linuxhttp_servern/a
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2022-24793
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.28% / 50.77%
||
7 Day CHG-0.02%
Published-06 Apr, 2022 | 00:00
Updated-23 Apr, 2025 | 18:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential heap buffer overflow when parsing DNS packets in PJSIP

PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead.

Action-Not Available
Vendor-pjsippjsipDebian GNU/Linux
Product-debian_linuxpjsippjproject
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2017-8834
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-1.04% / 76.58%
||
7 Day CHG~0.00%
Published-12 Jun, 2017 | 06:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The cr_tknzr_parse_comment function in cr-tknzr.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (memory allocation error) via a crafted CSS file.

Action-Not Available
Vendor-n/aopenSUSEThe GNOME Project
Product-leaplibcrocon/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-9141
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-1.40% / 79.68%
||
7 Day CHG~0.00%
Published-22 May, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c.

Action-Not Available
Vendor-n/aDebian GNU/LinuxImageMagick Studio LLC
Product-debian_linuximagemagickn/a
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-617
Reachable Assertion
CVE-2017-8354
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.66% / 70.11%
||
7 Day CHG~0.00%
Published-30 Apr, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ImageMagick 7.0.5-5, the ReadBMPImage function in bmp.c allows attackers to cause a denial of service (memory leak) via a crafted file.

Action-Not Available
Vendor-n/aDebian GNU/LinuxImageMagick Studio LLC
Product-debian_linuximagemagickn/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2022-0476
Matching Score-8
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-8
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.3||HIGH
EPSS-0.33% / 55.46%
||
7 Day CHG~0.00%
Published-23 Feb, 2022 | 16:40
Updated-02 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of Service in radareorg/radare2

Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.

Action-Not Available
Vendor-Fedora ProjectRadare2 (r2)
Product-fedoraradare2radareorg/radare2
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2017-8352
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.66% / 70.11%
||
7 Day CHG~0.00%
Published-30 Apr, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ImageMagick 7.0.5-5, the ReadXWDImage function in xwd.c allows attackers to cause a denial of service (memory leak) via a crafted file.

Action-Not Available
Vendor-n/aDebian GNU/LinuxImageMagick Studio LLC
Product-debian_linuximagemagickn/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2017-8344
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.66% / 70.11%
||
7 Day CHG~0.00%
Published-30 Apr, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ImageMagick 7.0.5-5, the ReadPCXImage function in pcx.c allows attackers to cause a denial of service (memory leak) via a crafted file.

Action-Not Available
Vendor-n/aDebian GNU/LinuxImageMagick Studio LLC
Product-debian_linuximagemagickn/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2017-7941
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-1.08% / 76.97%
||
7 Day CHG~0.00%
Published-18 Apr, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ReadSGIImage function in sgi.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.

Action-Not Available
Vendor-n/aDebian GNU/LinuxImageMagick Studio LLC
Product-debian_linuximagemagickn/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2017-8348
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.66% / 70.11%
||
7 Day CHG~0.00%
Published-30 Apr, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ImageMagick 7.0.5-5, the ReadMATImage function in mat.c allows attackers to cause a denial of service (memory leak) via a crafted file.

Action-Not Available
Vendor-n/aDebian GNU/LinuxImageMagick Studio LLC
Product-debian_linuximagemagickn/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2017-8343
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.66% / 70.11%
||
7 Day CHG~0.00%
Published-30 Apr, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ImageMagick 7.0.5-5, the ReadAAIImage function in aai.c allows attackers to cause a denial of service (memory leak) via a crafted file.

Action-Not Available
Vendor-n/aDebian GNU/LinuxImageMagick Studio LLC
Product-debian_linuximagemagickn/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2017-8350
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.66% / 70.11%
||
7 Day CHG~0.00%
Published-30 Apr, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ImageMagick 7.0.5-5, the ReadJNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.

Action-Not Available
Vendor-n/aDebian GNU/LinuxImageMagick Studio LLC
Product-debian_linuximagemagickn/a
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2022-24191
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 6.39%
||
7 Day CHG-0.00%
Published-04 Apr, 2022 | 10:33
Updated-03 Aug, 2024 | 04:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In HTMLDOC 1.9.14, an infinite loop in the gif_read_lzw function can lead to a pointer arbitrarily pointing to heap memory and resulting in a buffer overflow.

Action-Not Available
Vendor-htmldoc_projectn/aFedora Project
Product-htmldocfedoran/a
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2015-8783
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-6.5||MEDIUM
EPSS-0.66% / 70.07%
||
7 Day CHG~0.00%
Published-01 Feb, 2016 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.

Action-Not Available
Vendor-n/aLibTIFFDebian GNU/Linux
Product-libtiffdebian_linuxn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2017-6888
Matching Score-8
Assigner-Flexera Software LLC
ShareView Details
Matching Score-8
Assigner-Flexera Software LLC
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 25.48%
||
7 Day CHG~0.00%
Published-25 Apr, 2018 | 21:00
Updated-05 Aug, 2024 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An error in the "read_metadata_vorbiscomment_()" function (src/libFLAC/stream_decoder.c) in FLAC version 1.3.2 can be exploited to cause a memory leak via a specially crafted FLAC file.

Action-Not Available
Vendor-flac_projectFLACDebian GNU/LinuxFedora Project
Product-debian_linuxflacfedoraFLAC
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2017-7608
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.18% / 39.76%
||
7 Day CHG~0.00%
Published-09 Apr, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.

Action-Not Available
Vendor-elfutils_projectn/aDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxelfutilsn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2017-6836
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-1.35% / 79.32%
||
7 Day CHG~0.00%
Published-20 Mar, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the Expand3To4Module::run function in libaudiofile/modules/SimpleModule.h in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 allows remote attackers to cause a denial of service (crash) via a crafted file.

Action-Not Available
Vendor-audiofilen/aDebian GNU/Linux
Product-debian_linuxaudiofilen/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-21986
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-1.74% / 81.75%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 16:36
Updated-02 Jan, 2025 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
.NET Denial of Service Vulnerability

.NET Denial of Service Vulnerability

Action-Not Available
Vendor-Fedora ProjectMicrosoft Corporation
Product-visual_studio_2019fedoravisual_studio_2022.netMicrosoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8).NET 5.0Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)Visual Studio 2019 for Mac version 8.10Microsoft Visual Studio 2022 version 17.0.NET 6.0
CVE-2017-6831
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-2.09% / 83.31%
||
7 Day CHG~0.00%
Published-20 Mar, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the decodeBlockWAVE function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 and 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file.

Action-Not Available
Vendor-audiofilen/aDebian GNU/Linux
Product-debian_linuxaudiofilen/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-6834
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-2.65% / 85.19%
||
7 Day CHG~0.00%
Published-20 Mar, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the ulaw2linear_buf function in G711.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0, 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file.

Action-Not Available
Vendor-audiofilen/aDebian GNU/Linux
Product-debian_linuxaudiofilen/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-21443
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-3.7||LOW
EPSS-0.06% / 19.49%
||
7 Day CHG~0.00%
Published-19 Apr, 2022 | 20:37
Updated-03 Aug, 2024 | 02:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-azulDebian GNU/LinuxNetApp, Inc.Oracle Corporation
Product-bootstrap_osactive_iq_unified_managercloud_insights_acquisition_unithci_compute_nodeelement_softwaresolidfiresantricity_unified_managerdebian_linuxgraalvmzuluhci_management_nodejava_see-series_santricity_os_controllere-series_santricity_storage_managere-series_santricity_web_servicescloud_secure_agentoncommand_insightJava SE JDK and JRE
CVE-2017-5974
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.60% / 68.52%
||
7 Day CHG~0.00%
Published-01 Mar, 2017 | 15:00
Updated-10 Jul, 2025 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the __zzip_get32 function in fetch.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.

Action-Not Available
Vendor-gdraheimn/aDebian GNU/Linux
Product-zziplibdebian_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-36150
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.33% / 54.90%
||
7 Day CHG~0.00%
Published-08 Feb, 2021 | 20:13
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect handling of input data in loudness function in the libmysofa library 0.5 - 1.1 will lead to heap buffer overflow and access to unallocated memory block.

Action-Not Available
Vendor-symonicsn/aFedora Project
Product-libmysofafedoran/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2017-6299
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.21% / 43.90%
||
7 Day CHG~0.00%
Published-24 Feb, 2017 | 04:23
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "2 of 9. Infinite Loop / DoS in the TNEFFillMapi function in lib/ytnef.c."

Action-Not Available
Vendor-ytnef_projectn/aDebian GNU/Linux
Product-ytnefdebian_linuxn/a
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2022-2058
Matching Score-8
Assigner-GitLab Inc.
ShareView Details
Matching Score-8
Assigner-GitLab Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 25.64%
||
7 Day CHG~0.00%
Published-30 Jun, 2022 | 00:00
Updated-03 Aug, 2024 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.

Action-Not Available
Vendor-NetApp, Inc.LibTIFFFedora ProjectDebian GNU/Linux
Product-libtiffdebian_linuxactive_iq_unified_managerfedoralibtiff
CWE ID-CWE-369
Divide By Zero
CVE-2020-3862
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.22% / 44.17%
||
7 Day CHG~0.00%
Published-27 Feb, 2020 | 20:45
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. A malicious website may be able to cause a denial of service.

Action-Not Available
Vendor-openSUSEApple Inc.
Product-itunesiphone_osipadostvossafariicloudleapiTunes for WindowsiCloud for WindowsSafariiOSiCloud for Windows (Legacy)tvOS
CVE-2017-6500
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.27% / 50.12%
||
7 Day CHG~0.00%
Published-06 Mar, 2017 | 02:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in ImageMagick 6.9.7. A specially crafted sun file triggers a heap-based buffer over-read.

Action-Not Available
Vendor-n/aDebian GNU/LinuxImageMagick Studio LLC
Product-debian_linuximagemagickn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-1623
Matching Score-8
Assigner-GitLab Inc.
ShareView Details
Matching Score-8
Assigner-GitLab Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.77%
||
7 Day CHG~0.00%
Published-11 May, 2022 | 00:00
Updated-03 Aug, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.

Action-Not Available
Vendor-NetApp, Inc.LibTIFFFedora ProjectDebian GNU/Linux
Product-ontap_select_deploy_administration_utilitylibtiffdebian_linuxfedoralibtiff
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-3810
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-5.5||MEDIUM
EPSS-0.44% / 62.44%
||
7 Day CHG~0.00%
Published-15 May, 2020 | 13:42
Updated-17 Sep, 2024 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing input validation in the ar/tar implementations of APT before version 2.1.2 could result in denial of service when processing specially crafted deb files.

Action-Not Available
Vendor-Canonical Ltd.Fedora ProjectDebian GNU/Linux
Product-ubuntu_linuxaptdebian_linuxfedoraapt
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-20
Improper Input Validation
CVE-2022-1622
Matching Score-8
Assigner-GitLab Inc.
ShareView Details
Matching Score-8
Assigner-GitLab Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 20.02%
||
7 Day CHG~0.00%
Published-11 May, 2022 | 00:00
Updated-03 Aug, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.

Action-Not Available
Vendor-NetApp, Inc.Fedora ProjectLibTIFFApple Inc.
Product-iphone_oswatchostvosontap_select_deploy_administration_utilitylibtifffedoramacoslibtiff
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-36151
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.33% / 54.90%
||
7 Day CHG~0.00%
Published-08 Feb, 2021 | 20:13
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect handling of input data in mysofa_resampler_reset_mem function in the libmysofa library 0.5 - 1.1 will lead to heap buffer overflow and overwriting large memory block.

Action-Not Available
Vendor-symonicsn/aFedora Project
Product-libmysofafedoran/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2017-6011
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.35% / 57.00%
||
7 Day CHG~0.00%
Published-16 Feb, 2017 | 11:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in icoutils 0.31.1. An out-of-bounds read leading to a buffer overflow was observed in the "simple_vec" function in the "extract.c" source file. This affects icotool.

Action-Not Available
Vendor-icoutils_projectn/aRed Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_desktopenterprise_linux_server_tusenterprise_linux_workstationicoutilsenterprise_linux_server_eusdebian_linuxenterprise_linux_serverenterprise_linux_server_ausn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2017-6314
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.20% / 41.84%
||
7 Day CHG~0.00%
Published-10 Mar, 2017 | 02:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The make_available_at_least function in io-tiff.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (infinite loop) via a large TIFF file.

Action-Not Available
Vendor-n/aDebian GNU/LinuxThe GNOME ProjectFedora Project
Product-gdk-pixbufdebian_linuxfedoran/a
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2020-35521
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.11% / 29.51%
||
7 Day CHG~0.00%
Published-09 Mar, 2021 | 19:16
Updated-04 Aug, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in libtiff. Due to a memory allocation failure in tif_read.c, a crafted TIFF file can lead to an abort, resulting in denial of service.

Action-Not Available
Vendor-n/aNetApp, Inc.Red Hat, Inc.Fedora ProjectLibTIFF
Product-ontap_select_deploy_administration_utilitylibtiffenterprise_linuxfedoralibtiff
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-35493
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.36% / 57.34%
||
7 Day CHG~0.00%
Published-04 Jan, 2021 | 14:22
Updated-04 Aug, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -> out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.

Action-Not Available
Vendor-n/aFedora ProjectNetApp, Inc.GNUBroadcom Inc.
Product-brocade_fabric_operating_system_firmwarecloud_backupontap_select_deploy_administration_utilitysolidfire_\&_hci_management_nodefedorasolidfire\,_enterprise_sds_\&_hci_storage_nodehci_compute_node_firmwarehci_compute_nodebinutilsbinutils
CWE ID-CWE-20
Improper Input Validation
CVE-2022-0529
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.24% / 47.39%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:05
Updated-13 Feb, 2025 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.

Action-Not Available
Vendor-unzip_projectn/aDebian GNU/LinuxFedora ProjectRed Hat, Inc.
Product-unzipdebian_linuxfedoraenterprise_linuxunzip
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-0695
Matching Score-8
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-8
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-6.8||MEDIUM
EPSS-0.32% / 54.77%
||
7 Day CHG~0.00%
Published-24 Feb, 2022 | 12:25
Updated-02 Aug, 2024 | 23:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of Service in radareorg/radare2

Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.

Action-Not Available
Vendor-Fedora ProjectRadare2 (r2)
Product-fedoraradare2radareorg/radare2
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2017-5975
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.63% / 69.46%
||
7 Day CHG~0.00%
Published-01 Mar, 2017 | 15:00
Updated-10 Jul, 2025 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the __zzip_get64 function in fetch.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file.

Action-Not Available
Vendor-gdraheimn/aDebian GNU/Linux
Product-zziplibdebian_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-0856
Matching Score-8
Assigner-Fedora Project
ShareView Details
Matching Score-8
Assigner-Fedora Project
CVSS Score-6.5||MEDIUM
EPSS-3.62% / 87.34%
||
7 Day CHG~0.00%
Published-08 Mar, 2022 | 00:00
Updated-02 Aug, 2024 | 23:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libcaca is affected by a Divide By Zero issue via img2txt, which allows a remote malicious user to cause a Denial of Service

Action-Not Available
Vendor-libcaca_projectn/aFedora Project
Product-fedoralibcacalibcaca
CWE ID-CWE-369
Divide By Zero
CVE-2022-0907
Matching Score-8
Assigner-GitLab Inc.
ShareView Details
Matching Score-8
Assigner-GitLab Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.40%
||
7 Day CHG~0.00%
Published-11 Mar, 2022 | 00:00
Updated-02 Aug, 2024 | 23:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unchecked Return Value to NULL Pointer Dereference in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f2b656e2.

Action-Not Available
Vendor-NetApp, Inc.LibTIFFFedora ProjectDebian GNU/Linux
Product-ontap_select_deploy_administration_utilitylibtiffdebian_linuxfedoralibtiff
CWE ID-CWE-252
Unchecked Return Value
CVE-2022-0530
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 31.64%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:05
Updated-13 Feb, 2025 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.

Action-Not Available
Vendor-unzip_projectn/aDebian GNU/LinuxFedora ProjectApple Inc.Red Hat, Inc.
Product-debian_linuxunzipfedoraenterprise_linuxmac_os_xmacosunzip
CVE-2020-35522
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.58%
||
7 Day CHG~0.00%
Published-09 Mar, 2021 | 19:16
Updated-04 Aug, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In LibTIFF, there is a memory malloc failure in tif_pixarlog.c. A crafted TIFF document can lead to an abort, resulting in a remote denial of service attack.

Action-Not Available
Vendor-n/aNetApp, Inc.Red Hat, Inc.Fedora ProjectLibTIFF
Product-ontap_select_deploy_administration_utilitylibtifffedoraenterprise_linuxlibtiff
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-24859
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.15% / 35.83%
||
7 Day CHG~0.00%
Published-18 Apr, 2022 | 00:00
Updated-22 Apr, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Manipulated inline images can cause Infinite Loop in PyPDF2

PyPDF2 is an open source python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. In versions prior to 1.27.5 an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop if the PyPDF2 if the code attempts to get the content stream. The reason is that the last while-loop in `ContentStream._readInlineImage` only terminates when it finds the `EI` token, but never actually checks if the stream has already ended. This issue has been resolved in version `1.27.5`. Users unable to upgrade should validate and PDFs prior to iterating over their content stream.

Action-Not Available
Vendor-pypdf2_projectpy-pdfDebian GNU/Linux
Product-debian_linuxpypdf2PyPDF2
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2022-0156
Matching Score-8
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-8
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-6.8||MEDIUM
EPSS-0.12% / 32.18%
||
7 Day CHG~0.00%
Published-10 Jan, 2022 | 15:26
Updated-02 Aug, 2024 | 23:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in vim/vim

vim is vulnerable to Use After Free

Action-Not Available
Vendor-Fedora ProjectVimApple Inc.
Product-fedoramacosvimvim/vim
CWE ID-CWE-416
Use After Free
CVE-2017-6312
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.11% / 29.86%
||
7 Day CHG~0.00%
Published-10 Mar, 2017 | 02:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in io-ico.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted image entry offset in an ICO file, which triggers an out-of-bounds read, related to compiler optimizations.

Action-Not Available
Vendor-n/aDebian GNU/LinuxThe GNOME ProjectFedora Project
Product-gdk-pixbufdebian_linuxfedoran/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2020-2909
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-2.8||LOW
EPSS-0.22% / 44.98%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 13:29
Updated-27 Sep, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 2.8 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).

Action-Not Available
Vendor-openSUSEOracle Corporation
Product-vm_virtualboxleapVM VirtualBox
CVE-2020-28241
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.21% / 43.43%
||
7 Day CHG~0.00%
Published-06 Nov, 2020 | 04:43
Updated-04 Aug, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libmaxminddb before 1.4.3 has a heap-based buffer over-read in dump_entry_data_list in maxminddb.c.

Action-Not Available
Vendor-maxmindn/aDebian GNU/LinuxFedora Project
Product-debian_linuxfedoralibmaxminddbn/a
CWE ID-CWE-125
Out-of-bounds Read
  • Previous
  • 1
  • 2
  • ...
  • 6
  • 7
  • 8
  • ...
  • 39
  • 40
  • Next
Details not found