Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-3511

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-13 Aug, 2014 | 23:00
Updated At-06 Aug, 2024 | 10:43
Rejected At-
Credits

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:13 Aug, 2014 | 23:00
Updated At:06 Aug, 2024 | 10:43
Rejected At:
▼CVE Numbering Authority (CNA)

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
vendor-advisory
x_refsource_SUSE
http://linux.oracle.com/errata/ELSA-2014-1052.html
x_refsource_CONFIRM
http://secunia.com/advisories/60221
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21682293
x_refsource_CONFIRM
http://secunia.com/advisories/61184
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142660345230545&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/60022
third-party-advisory
x_refsource_SECUNIA
https://www.openssl.org/news/secadv_20140806.txt
x_refsource_CONFIRM
http://secunia.com/advisories/61017
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2015-0197.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/60377
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142350350616251&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/59887
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21683389
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142791032306609&w=2
vendor-advisory
x_refsource_HP
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
x_refsource_CONFIRM
http://secunia.com/advisories/60890
third-party-advisory
x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201412-39.xml
vendor-advisory
x_refsource_GENTOO
http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142660345230545&w=2
vendor-advisory
x_refsource_HP
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142495837901899&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/60803
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59700
third-party-advisory
x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
vendor-advisory
x_refsource_FEDORA
http://www.securitytracker.com/id/1030693
vdb-entry
x_refsource_SECTRACK
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/95162
vdb-entry
x_refsource_XF
http://www.splunk.com/view/SP-CAAANHS
x_refsource_CONFIRM
http://secunia.com/advisories/60917
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142350350616251&w=2
vendor-advisory
x_refsource_HP
http://www.tenable.com/security/tns-2014-06
x_refsource_CONFIRM
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
vendor-advisory
x_refsource_NETBSD
https://kc.mcafee.com/corporate/index?page=content&id=SB10084
x_refsource_CONFIRM
http://secunia.com/advisories/60493
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59710
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60921
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/69079
vdb-entry
x_refsource_BID
http://secunia.com/advisories/61043
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60810
third-party-advisory
x_refsource_SECUNIA
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=280b1f1ad12131defcd986676a8fc9717aaa601b
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
x_refsource_CONFIRM
http://secunia.com/advisories/61100
third-party-advisory
x_refsource_SECUNIA
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
vendor-advisory
x_refsource_FREEBSD
http://secunia.com/advisories/61775
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142495837901899&w=2
vendor-advisory
x_refsource_HP
http://www.debian.org/security/2014/dsa-2998
vendor-advisory
x_refsource_DEBIAN
http://marc.info/?l=bugtraq&m=143290437727362&w=2
vendor-advisory
x_refsource_HP
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/61959
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59756
third-party-advisory
x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=1127504
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142624590206005&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=143290522027658&w=2
vendor-advisory
x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2015-0126.html
vendor-advisory
x_refsource_REDHAT
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
x_refsource_CONFIRM
http://secunia.com/advisories/58962
third-party-advisory
x_refsource_SECUNIA
http://www.arubanetworks.com/support/alerts/aid-08182014.txt
x_refsource_CONFIRM
http://secunia.com/advisories/60938
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60684
third-party-advisory
x_refsource_SECUNIA
https://support.citrix.com/article/CTX216642
x_refsource_CONFIRM
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
mailing-list
x_refsource_MLIST
https://techzone.ergon.ch/CVE-2014-3511
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
x_refsource_CONFIRM
http://secunia.com/advisories/61139
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-1052.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60221
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21682293
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61184
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142660345230545&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/60022
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www.openssl.org/news/secadv_20140806.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61017
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2015-0197.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/60377
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142350350616251&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/59887
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21683389
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142791032306609&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60890
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://security.gentoo.org/glsa/glsa-201412-39.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142660345230545&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142495837901899&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/60803
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59700
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.securitytracker.com/id/1030693
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
Resource:
x_refsource_CONFIRM
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/95162
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.splunk.com/view/SP-CAAANHS
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60917
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142350350616251&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.tenable.com/security/tns-2014-06
Resource:
x_refsource_CONFIRM
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10084
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60493
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59710
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60921
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/69079
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/advisories/61043
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60810
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=280b1f1ad12131defcd986676a8fc9717aaa601b
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61100
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: http://secunia.com/advisories/61775
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142495837901899&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.debian.org/security/2014/dsa-2998
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://marc.info/?l=bugtraq&m=143290437727362&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/61959
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59756
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1127504
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142624590206005&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=143290522027658&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://rhn.redhat.com/errata/RHSA-2015-0126.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/58962
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.arubanetworks.com/support/alerts/aid-08182014.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60938
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60684
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.citrix.com/article/CTX216642
Resource:
x_refsource_CONFIRM
Hyperlink: https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://techzone.ergon.ch/CVE-2014-3511
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686997
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61139
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://linux.oracle.com/errata/ELSA-2014-1052.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60221
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21682293
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61184
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142660345230545&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/60022
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www.openssl.org/news/secadv_20140806.txt
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61017
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2015-0197.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/60377
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142350350616251&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/59887
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21683389
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142791032306609&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60890
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://security.gentoo.org/glsa/glsa-201412-39.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142660345230545&w=2
vendor-advisory
x_refsource_HP
x_transferred
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142495837901899&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/60803
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59700
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.securitytracker.com/id/1030693
vdb-entry
x_refsource_SECTRACK
x_transferred
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
x_refsource_CONFIRM
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/95162
vdb-entry
x_refsource_XF
x_transferred
http://www.splunk.com/view/SP-CAAANHS
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60917
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142350350616251&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.tenable.com/security/tns-2014-06
x_refsource_CONFIRM
x_transferred
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
vendor-advisory
x_refsource_NETBSD
x_transferred
https://kc.mcafee.com/corporate/index?page=content&id=SB10084
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60493
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59710
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60921
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/69079
vdb-entry
x_refsource_BID
x_transferred
http://secunia.com/advisories/61043
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60810
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=280b1f1ad12131defcd986676a8fc9717aaa601b
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61100
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
http://secunia.com/advisories/61775
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142495837901899&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.debian.org/security/2014/dsa-2998
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://marc.info/?l=bugtraq&m=143290437727362&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/61959
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59756
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=1127504
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142624590206005&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=143290522027658&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://rhn.redhat.com/errata/RHSA-2015-0126.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/58962
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.arubanetworks.com/support/alerts/aid-08182014.txt
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60938
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60684
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.citrix.com/article/CTX216642
x_refsource_CONFIRM
x_transferred
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
mailing-list
x_refsource_MLIST
x_transferred
https://techzone.ergon.ch/CVE-2014-3511
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61139
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-1052.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60221
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21682293
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61184
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142660345230545&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/60022
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www.openssl.org/news/secadv_20140806.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61017
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2015-0197.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/60377
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142350350616251&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/59887
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21683389
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142791032306609&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60890
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-201412-39.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142660345230545&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142495837901899&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/60803
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59700
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.securitytracker.com/id/1030693
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/95162
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.splunk.com/view/SP-CAAANHS
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60917
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142350350616251&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.tenable.com/security/tns-2014-06
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
x_transferred
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10084
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60493
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59710
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60921
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/69079
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/advisories/61043
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60810
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=280b1f1ad12131defcd986676a8fc9717aaa601b
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61100
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: http://secunia.com/advisories/61775
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142495837901899&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.debian.org/security/2014/dsa-2998
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=143290437727362&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/61959
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59756
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1127504
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142624590206005&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=143290522027658&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2015-0126.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/58962
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.arubanetworks.com/support/alerts/aid-08182014.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60938
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60684
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.citrix.com/article/CTX216642
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://techzone.ergon.ch/CVE-2014-3511
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686997
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61139
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:13 Aug, 2014 | 23:55
Updated At:12 Apr, 2025 | 10:46

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

OpenSSL
openssl
>>openssl>>1.0.0
cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0
cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0
cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0
cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0
cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0
cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0a
cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0b
cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0c
cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0d
cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0e
cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0f
cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0g
cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0h
cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0i
cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0j
cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0k
cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0l
cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.0m
cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.1
cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.1
cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.1
cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.1
cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.1a
cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.1b
cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.1c
cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.1d
cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.1e
cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.1f
cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.1g
cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>1.0.1h
cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.ascsecalert@redhat.com
N/A
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.ascsecalert@redhat.com
N/A
http://linux.oracle.com/errata/ELSA-2014-1052.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.htmlsecalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=142350350616251&w=2secalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=142350350616251&w=2secalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=142495837901899&w=2secalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=142495837901899&w=2secalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=142624590206005&w=2secalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=142660345230545&w=2secalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=142660345230545&w=2secalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=142791032306609&w=2secalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=143290437727362&w=2secalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=143290522027658&w=2secalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2015-0126.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2015-0197.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/58962secalert@redhat.com
N/A
http://secunia.com/advisories/59700secalert@redhat.com
N/A
http://secunia.com/advisories/59710secalert@redhat.com
N/A
http://secunia.com/advisories/59756secalert@redhat.com
N/A
http://secunia.com/advisories/59887secalert@redhat.com
N/A
http://secunia.com/advisories/60022secalert@redhat.com
N/A
http://secunia.com/advisories/60221secalert@redhat.com
N/A
http://secunia.com/advisories/60377secalert@redhat.com
N/A
http://secunia.com/advisories/60493secalert@redhat.com
N/A
http://secunia.com/advisories/60684secalert@redhat.com
N/A
http://secunia.com/advisories/60803secalert@redhat.com
N/A
http://secunia.com/advisories/60810secalert@redhat.com
N/A
http://secunia.com/advisories/60890secalert@redhat.com
N/A
http://secunia.com/advisories/60917secalert@redhat.com
N/A
http://secunia.com/advisories/60921secalert@redhat.com
N/A
http://secunia.com/advisories/60938secalert@redhat.com
N/A
http://secunia.com/advisories/61017secalert@redhat.com
N/A
http://secunia.com/advisories/61043secalert@redhat.com
N/A
http://secunia.com/advisories/61100secalert@redhat.com
N/A
http://secunia.com/advisories/61139secalert@redhat.com
N/A
http://secunia.com/advisories/61184secalert@redhat.com
N/A
http://secunia.com/advisories/61775secalert@redhat.com
N/A
http://secunia.com/advisories/61959secalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-201412-39.xmlsecalert@redhat.com
N/A
http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.htmlsecalert@redhat.com
N/A
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240secalert@redhat.com
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21682293secalert@redhat.com
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21683389secalert@redhat.com
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686997secalert@redhat.com
N/A
http://www.arubanetworks.com/support/alerts/aid-08182014.txtsecalert@redhat.com
N/A
http://www.debian.org/security/2014/dsa-2998secalert@redhat.com
N/A
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htmsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/69079secalert@redhat.com
N/A
http://www.securitytracker.com/id/1030693secalert@redhat.com
N/A
http://www.splunk.com/view/SP-CAAANHSsecalert@redhat.com
N/A
http://www.tenable.com/security/tns-2014-06secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=1127504secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/95162secalert@redhat.com
N/A
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=280b1f1ad12131defcd986676a8fc9717aaa601bsecalert@redhat.com
N/A
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888secalert@redhat.com
N/A
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380secalert@redhat.com
N/A
https://kc.mcafee.com/corporate/index?page=content&id=SB10084secalert@redhat.com
N/A
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.htmlsecalert@redhat.com
N/A
https://support.citrix.com/article/CTX216642secalert@redhat.com
N/A
https://techzone.ergon.ch/CVE-2014-3511secalert@redhat.com
N/A
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.ascsecalert@redhat.com
N/A
https://www.openssl.org/news/secadv_20140806.txtsecalert@redhat.com
Vendor Advisory
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.ascaf854a3a-2127-422b-91ae-364da2661108
N/A
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.ascaf854a3a-2127-422b-91ae-364da2661108
N/A
http://linux.oracle.com/errata/ELSA-2014-1052.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142350350616251&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142350350616251&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142495837901899&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142495837901899&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142624590206005&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142660345230545&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142660345230545&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142791032306609&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=143290437727362&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=143290522027658&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2015-0126.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2015-0197.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/58962af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59700af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59710af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59756af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59887af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60022af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60221af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60377af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60493af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60684af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60803af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60810af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60890af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60917af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60921af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60938af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61017af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61043af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61100af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61139af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61184af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61775af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61959af854a3a-2127-422b-91ae-364da2661108
N/A
http://security.gentoo.org/glsa/glsa-201412-39.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21682293af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21683389af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686997af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.arubanetworks.com/support/alerts/aid-08182014.txtaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2014/dsa-2998af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/69079af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securitytracker.com/id/1030693af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.splunk.com/view/SP-CAAANHSaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.tenable.com/security/tns-2014-06af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=1127504af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/95162af854a3a-2127-422b-91ae-364da2661108
N/A
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=280b1f1ad12131defcd986676a8fc9717aaa601baf854a3a-2127-422b-91ae-364da2661108
N/A
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888af854a3a-2127-422b-91ae-364da2661108
N/A
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380af854a3a-2127-422b-91ae-364da2661108
N/A
https://kc.mcafee.com/corporate/index?page=content&id=SB10084af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://support.citrix.com/article/CTX216642af854a3a-2127-422b-91ae-364da2661108
N/A
https://techzone.ergon.ch/CVE-2014-3511af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.ascaf854a3a-2127-422b-91ae-364da2661108
N/A
https://www.openssl.org/news/secadv_20140806.txtaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-1052.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142350350616251&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142350350616251&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142495837901899&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142495837901899&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142624590206005&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142660345230545&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142660345230545&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142791032306609&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=143290437727362&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=143290522027658&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2015-0126.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2015-0197.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/58962
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/59700
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/59710
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/59756
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/59887
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60022
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60221
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60377
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60493
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60684
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60803
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60810
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60890
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60917
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60921
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/60938
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/61017
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/61043
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/61100
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/61139
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/61184
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/61775
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/61959
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-201412-39.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21682293
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21683389
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686997
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.arubanetworks.com/support/alerts/aid-08182014.txt
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2014/dsa-2998
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/69079
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securitytracker.com/id/1030693
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.splunk.com/view/SP-CAAANHS
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.tenable.com/security/tns-2014-06
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1127504
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/95162
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=280b1f1ad12131defcd986676a8fc9717aaa601b
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10084
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX216642
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://techzone.ergon.ch/CVE-2014-3511
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.openssl.org/news/secadv_20140806.txt
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-1052.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142350350616251&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142350350616251&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142495837901899&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142495837901899&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142624590206005&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142660345230545&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142660345230545&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142791032306609&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=143290437727362&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=143290522027658&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2015-0126.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2015-0197.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/58962
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59700
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59710
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59756
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59887
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60022
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60221
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60377
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60493
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60684
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60803
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60810
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60890
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60917
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60921
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60938
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61017
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61043
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61100
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61139
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61184
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61775
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61959
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-201412-39.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21682293
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21683389
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686997
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.arubanetworks.com/support/alerts/aid-08182014.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2014/dsa-2998
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/69079
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securitytracker.com/id/1030693
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.splunk.com/view/SP-CAAANHS
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.tenable.com/security/tns-2014-06
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1127504
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/95162
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=280b1f1ad12131defcd986676a8fc9717aaa601b
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10084
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX216642
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://techzone.ergon.ch/CVE-2014-3511
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.openssl.org/news/secadv_20140806.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

10Records found

CVE-2008-7270
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.58% / 80.84%
||
7 Day CHG~0.00%
Published-06 Dec, 2010 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CVE-2018-0733
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.58% / 68.03%
||
7 Day CHG~0.00%
Published-27 Mar, 2018 | 21:00
Updated-16 Sep, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect CRYPTO_memcmp on HP-UX PA-RISC

Because of an implementation bug the PA-RISC CRYPTO_memcmp function is effectively reduced to only comparing the least significant bit of each byte. This allows an attacker to forge messages that would be considered as authenticated in an amount of tries lower than that guaranteed by the security claims of the scheme. The module can only be compiled by the HP-UX assembler, so that only HP-UX PA-RISC targets are affected. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g).

Action-Not Available
Vendor-OpenSSL
Product-opensslOpenSSL
CVE-2022-1434
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.06% / 17.62%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 15:15
Updated-17 Sep, 2024 | 04:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect MAC key used in the RC4-MD5 ciphersuite

The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. This makes the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being sent from one endpoint to an OpenSSL 3.0 recipient such that the modified data would still pass the MAC integrity check. Note that data sent from an OpenSSL 3.0 endpoint to a non-OpenSSL 3.0 endpoint will always be rejected by the recipient and the connection will fail at that point. Many application protocols require data to be sent from the client to the server first. Therefore, in such a case, only an OpenSSL 3.0 server would be impacted when talking to a non-OpenSSL 3.0 client. If both endpoints are OpenSSL 3.0 then the attacker could modify data being sent in both directions. In this case both clients and servers could be affected, regardless of the application protocol. Note that in the absence of an attacker this bug means that an OpenSSL 3.0 endpoint communicating with a non-OpenSSL 3.0 endpoint will fail to complete the handshake when using this ciphersuite. The confidentiality of data is not impacted by this issue, i.e. an attacker cannot decrypt data that has been encrypted using this ciphersuite - they can only modify it. In order for this attack to work both endpoints must legitimately negotiate the RC4-MD5 ciphersuite. This ciphersuite is not compiled by default in OpenSSL 3.0, and is not available within the default provider or the default ciphersuite list. This ciphersuite will never be used if TLSv1.3 has been negotiated. In order for an OpenSSL 3.0 endpoint to use this ciphersuite the following must have occurred: 1) OpenSSL must have been compiled with the (non-default) compile time option enable-weak-ssl-ciphers 2) OpenSSL must have had the legacy provider explicitly loaded (either through application code or via configuration) 3) The ciphersuite must have been explicitly added to the ciphersuite list 4) The libssl security level must have been set to 0 (default is 1) 5) A version of SSL/TLS below TLSv1.3 must have been negotiated 6) Both endpoints must negotiate the RC4-MD5 ciphersuite in preference to any others that both endpoints have in common Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).

Action-Not Available
Vendor-OpenSSLNetApp, Inc.
Product-aff_8300aff_500f_firmwarea700s_firmwareopensslfas_500f_firmwaresolidfire_\&_hci_management_nodeh300s_firmwareaff_a400_firmwareh410sh300sfabric-attached_storage_a400_firmwareh300e_firmwareclustered_data_ontapsmi-s_providerh500eh500s_firmwareh500e_firmwareaff_500fa700sh700eaff_8700_firmwareh300ea250_firmwareh500sactive_iq_unified_managerfas_8700aff_8700aff_8300_firmwarefas_8700_firmwaresnapmanagerh410s_firmwareh700s_firmwareaff_a400clustered_data_ontap_antivirus_connectorfas_8300_firmwarea250solidfire\,_enterprise_sds_\&_hci_storage_nodeh700e_firmwarefas_8300fabric-attached_storage_a400h700sfas_500fsantricity_smi-s_providerOpenSSL
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2022-1343
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-5.3||MEDIUM
EPSS-0.12% / 31.54%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 15:15
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OCSP_basic_verify may incorrectly verify the response signing certificate

The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).

Action-Not Available
Vendor-OpenSSLNetApp, Inc.
Product-h410saff_8700_firmwareactive_iq_unified_managerfas_8300_firmwarefas_500f_firmwareh500s_firmwareaff_a400aff_500fsantricity_smi-s_provideropensslh700sh500sfas_8700_firmwarea250_firmwareh700e_firmwareaff_8700h500e_firmwaresolidfire\,_enterprise_sds_\&_hci_storage_nodeclustered_data_ontap_antivirus_connectorclustered_data_ontaph300eh300e_firmwareaff_500f_firmwaresolidfire_\&_hci_management_nodeaff_8300h700eh500eh700s_firmwarea700ssmi-s_providera250fas_8700fabric-attached_storage_a400_firmwaresnapmanagerh300sh410s_firmwarefas_8300h300s_firmwarefas_500faff_8300_firmwareaff_a400_firmwarea700s_firmwarefabric-attached_storage_a400OpenSSL
CWE ID-CWE-295
Improper Certificate Validation
CVE-2014-3568
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-4.41% / 88.58%
||
7 Day CHG~0.00%
Published-19 Oct, 2014 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
CVE-2021-23839
Matching Score-8
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-8
Assigner-OpenSSL Software Foundation
CVSS Score-3.7||LOW
EPSS-0.26% / 48.85%
||
7 Day CHG~0.00%
Published-16 Feb, 2021 | 16:55
Updated-17 Sep, 2024 | 03:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect SSLv2 rollback protection

OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).

Action-Not Available
Vendor-OpenSSLSiemens AGOracle Corporation
Product-jd_edwards_world_securityenterprise_manager_for_storage_managementsinec_insgraalvmopensslzfs_storage_appliance_kitbusiness_intelligenceenterprise_manager_ops_centerOpenSSL
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2010-4180
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-7.18% / 91.21%
||
7 Day CHG~0.00%
Published-06 Dec, 2010 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.

Action-Not Available
Vendor-n/aF5, Inc.SUSEDebian GNU/LinuxCanonical Ltd.OpenSSLFedora ProjectopenSUSE
Product-ubuntu_linuxfedoraopensusedebian_linuxnginxlinux_enterpriseopenssllinux_enterprise_serverlinux_enterprise_desktopn/a
CVE-2009-3767
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.96% / 82.76%
||
7 Day CHG~0.00%
Published-23 Oct, 2009 | 19:00
Updated-07 Aug, 2024 | 06:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Action-Not Available
Vendor-openldapn/aOpenSSLApple Inc.Fedora Project
Product-fedoraopenldapmac_os_xopenssln/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2015-4000
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-3.7||LOW
EPSS-93.91% / 99.87%
||
7 Day CHG~0.00%
Published-21 May, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.

Action-Not Available
Vendor-n/aMicrosoft CorporationIBM CorporationDebian GNU/LinuxOracle CorporationMozilla CorporationSUSEGoogle LLCApple Inc.OpenSSLOperaHP Inc.Canonical Ltd.
Product-opera_browserlinux_enterprise_serverfirefoxiphone_osinternet_explorerhp-uxjdklinux_enterprise_desktopthunderbirdnetwork_security_servicesdebian_linuxsparc-opl_service_processorfirefox_oslinux_enterprise_software_development_kitjrockitseamonkeycontent_managerfirefox_esrubuntu_linuxsuse_linux_enterprise_serverchromesafariopenssljremac_os_xn/a
CVE-2015-0204
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-91.96% / 99.69%
||
7 Day CHG~0.00%
Published-09 Jan, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.

Action-Not Available
Vendor-n/aOpenSSL
Product-openssln/a
Details not found