CVE-2014-0160
critical-risk
Published 2014-04-07
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
Do I need to act?
!
94.5% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (257)
Third Party Advisory
http://advisories.mageia.org/MGASA-2014-0165.html
Release Notes
http://cogentdatahub.com/ReleaseNotes.html
Third Party Advisory
http://heartbleed.com/
Mailing List
http://marc.info/?l=bugtraq&m=139722163017074&w=2
Mailing List
http://marc.info/?l=bugtraq&m=139757726426985&w=2
Mailing List
http://marc.info/?l=bugtraq&m=139757819327350&w=2
Mailing List
http://marc.info/?l=bugtraq&m=139757919027752&w=2
Mailing List
http://marc.info/?l=bugtraq&m=139758572430452&w=2
Mailing List
http://marc.info/?l=bugtraq&m=139765756720506&w=2
Mailing List
http://marc.info/?l=bugtraq&m=139774054614965&w=2
Mailing List
http://marc.info/?l=bugtraq&m=139774703817488&w=2
and 237 more references
85
/ 100
critical-risk
Severity
26/34 · High
Exploitability
34/34 · Critical
Exposure
25/34 · High