CVE-2014-0224

Current Description

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

Basic Data

PublishedJune 05, 2014
Last ModifiedJuly 28, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-326
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:P/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score5.8
SeverityMEDIUM
Exploitability Score8.6
Impact Score4.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationOpensslOpenssl********0.9.8za
    2.3ApplicationOpensslOpenssl********1.0.01.0.0m
    2.3ApplicationOpensslOpenssl********1.0.11.0.1h
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatJboss Enterprise Application Platform5.2.0*******
    2.3ApplicationRedhatJboss Enterprise Application Platform6.2.3*******
    2.3ApplicationRedhatJboss Enterprise Web Platform5.2.0*******
    2.3ApplicationRedhatJboss Enterprise Web Server2.0.1*******
    2.3ApplicationRedhatStorage2.1*******
    2.3OSFedoraprojectFedora19*******
    2.3OSFedoraprojectFedora20*******
    2.3OSOpensuseOpensuse13.1*******
    2.3OSOpensuseOpensuse13.2*******
    2.3OSRedhatEnterprise Linux4*******
    2.3OSRedhatEnterprise Linux5*******
    2.3OSRedhatEnterprise Linux6.0*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationFilezilla-projectFilezilla Server********0.9.45
  • AND
    • OR - Configuration 4
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3OSSiemensApplication Processing Engine Firmware********2.0.2
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3HardwareSiemensApplication Processing Engine-*******
  • AND
    • OR - Configuration 5
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3OSSiemensCp1543-1 Firmware********1.1.25
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3HardwareSiemensCp1543-1-*******
  • AND
    • OR - Configuration 6
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3OSSiemensS7-1500 Firmware********1.6
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3HardwareSiemensS7-1500-*******
  • AND
    • OR - Configuration 7
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3OSSiemensRox Firmware********1.16.1
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3HardwareSiemensRox-*******

Vulnerable Software List

VendorProductVersions
Openssl Openssl *
Redhat Jboss Enterprise Application Platform 5.2.0, 6.2.3
Redhat Enterprise Linux 4, 5, 6.0
Redhat Jboss Enterprise Web Server 2.0.1
Redhat Storage 2.1
Redhat Jboss Enterprise Web Platform 5.2.0
Opensuse Opensuse 13.1, 13.2
Siemens S7-1500 Firmware *
Siemens Application Processing Engine Firmware *
Siemens Rox Firmware *
Siemens Cp1543-1 Firmware *
Filezilla-project Filezilla Server *
Fedoraproject Fedora 19, 20

References

NameSourceURLTags
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.aschttp://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.ascCONFIRMThird Party Advisory
http://ccsinjection.lepidum.co.jphttp://ccsinjection.lepidum.co.jpMISCThird Party Advisory
http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.htmlhttp://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.htmlCONFIRMThird Party Advisory
http://esupport.trendmicro.com/solution/en-US/1103813.aspxhttp://esupport.trendmicro.com/solution/en-US/1103813.aspxCONFIRMThird Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629CONFIRMNot Applicable
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195CONFIRMNot Applicable
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217CONFIRMThird Party Advisory
http://linux.oracle.com/errata/ELSA-2014-1053.htmlhttp://linux.oracle.com/errata/ELSA-2014-1053.htmlCONFIRMThird Party Advisory
FEDORA-2014-9301http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmlFEDORAThird Party Advisory
FEDORA-2014-9308http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlFEDORAThird Party Advisory
SUSE-SU-2015:0578http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.htmlSUSEThird Party Advisory
SUSE-SU-2015:0743http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.htmlSUSEThird Party Advisory
openSUSE-SU-2016:0640http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlSUSEThird Party Advisory
openSUSE-SU-2015:0229http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.htmlSUSEThird Party Advisory
HPSBUX03046http://marc.info/?l=bugtraq&m=140266410314613&w=2HPThird Party Advisory
HPSBOV03047http://marc.info/?l=bugtraq&m=140317760000786&w=2HPThird Party Advisory
HPSBMU03053http://marc.info/?l=bugtraq&m=140369637402535&w=2HPThird Party Advisory
HPSBMU03058http://marc.info/?l=bugtraq&m=140386311427810&w=2HPThird Party Advisory
HPSBMU03057http://marc.info/?l=bugtraq&m=140389274407904&w=2HPThird Party Advisory
HPSBMU03056http://marc.info/?l=bugtraq&m=140389355508263&w=2HPThird Party Advisory
HPSBMU03055http://marc.info/?l=bugtraq&m=140431828824371&w=2HPThird Party Advisory
HPSBMU03051http://marc.info/?l=bugtraq&m=140448122410568&w=2HPThird Party Advisory
HPSBGN03050http://marc.info/?l=bugtraq&m=140482916501310&w=2HPThird Party Advisory
HPSBMU03065http://marc.info/?l=bugtraq&m=140491231331543&w=2HPThird Party Advisory
HPSBMU03070http://marc.info/?l=bugtraq&m=140499864129699&w=2HPThird Party Advisory
HPSBGN03068http://marc.info/?l=bugtraq&m=140544599631400&w=2HPThird Party Advisory
HPSBMU03071http://marc.info/?l=bugtraq&m=140604261522465&w=2HPThird Party Advisory
HPSBMU03074http://marc.info/?l=bugtraq&m=140621259019789&w=2HPThird Party Advisory
HPSBMU03078http://marc.info/?l=bugtraq&m=140672208601650&w=2HPThird Party Advisory
HPSBMU03062http://marc.info/?l=bugtraq&m=140752315422991&w=2HPThird Party Advisory
HPSBMU03089http://marc.info/?l=bugtraq&m=140784085708882&w=2HPThird Party Advisory
HPSBHF03088http://marc.info/?l=bugtraq&m=140794476212181&w=2HPThird Party Advisory
HPSBMU03094http://marc.info/?l=bugtraq&m=140852757108392&w=2HPThird Party Advisory
HPSBMU03101http://marc.info/?l=bugtraq&m=140852826008699&w=2HPThird Party Advisory
HPSBST03098http://marc.info/?l=bugtraq&m=140870499402361&w=2HPThird Party Advisory
HPSBMU03076http://marc.info/?l=bugtraq&m=140904544427729&w=2HPThird Party Advisory
HPSBMU03083http://marc.info/?l=bugtraq&m=140983229106599&w=2HPThird Party Advisory
HPSBST03106http://marc.info/?l=bugtraq&m=141025641601169&w=2HPThird Party Advisory
HPSBPI03107http://marc.info/?l=bugtraq&m=141147110427269&w=2HPThird Party Advisory
HPSBST03103http://marc.info/?l=bugtraq&m=141164638606214&w=2HPThird Party Advisory
HPSBST03097http://marc.info/?l=bugtraq&m=141383410222440&w=2HPThird Party Advisory
HPSBHF03145http://marc.info/?l=bugtraq&m=141383465822787&w=2HPThird Party Advisory
HPSBHF03052http://marc.info/?l=bugtraq&m=141658880509699&w=2HPThird Party Advisory
SSRT101818http://marc.info/?l=bugtraq&m=142350350616251&w=2HPThird Party Advisory
HPSBST03265http://marc.info/?l=bugtraq&m=142546741516006&w=2HPThird Party Advisory
HPSBST03195http://marc.info/?l=bugtraq&m=142805027510172&w=2HPThird Party Advisory
http://puppetlabs.com/security/cve/cve-2014-0224http://puppetlabs.com/security/cve/cve-2014-0224CONFIRMThird Party Advisory
RHSA-2014:0624http://rhn.redhat.com/errata/RHSA-2014-0624.htmlREDHATThird Party Advisory
RHSA-2014:0626http://rhn.redhat.com/errata/RHSA-2014-0626.htmlREDHATThird Party Advisory
RHSA-2014:0627http://rhn.redhat.com/errata/RHSA-2014-0627.htmlREDHATThird Party Advisory
RHSA-2014:0630http://rhn.redhat.com/errata/RHSA-2014-0630.htmlREDHATThird Party Advisory
RHSA-2014:0631http://rhn.redhat.com/errata/RHSA-2014-0631.htmlREDHATThird Party Advisory
RHSA-2014:0632http://rhn.redhat.com/errata/RHSA-2014-0632.htmlREDHATThird Party Advisory
RHSA-2014:0633http://rhn.redhat.com/errata/RHSA-2014-0633.htmlREDHATThird Party Advisory
RHSA-2014:0680http://rhn.redhat.com/errata/RHSA-2014-0680.htmlREDHATThird Party Advisory
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilitieshttp://seclists.org/fulldisclosure/2014/Dec/23FULLDISCMailing List Third Party Advisory
20140607 Re: More OpenSSL issueshttp://seclists.org/fulldisclosure/2014/Jun/38FULLDISCMailing List Third Party Advisory
58128http://secunia.com/advisories/58128SECUNIAThird Party Advisory
58337http://secunia.com/advisories/58337SECUNIAThird Party Advisory
58385http://secunia.com/advisories/58385SECUNIAThird Party Advisory
58433http://secunia.com/advisories/58433SECUNIAThird Party Advisory
58492http://secunia.com/advisories/58492SECUNIAThird Party Advisory
58579http://secunia.com/advisories/58579SECUNIAThird Party Advisory
58615http://secunia.com/advisories/58615SECUNIAThird Party Advisory
58639http://secunia.com/advisories/58639SECUNIAThird Party Advisory
58660http://secunia.com/advisories/58660SECUNIAThird Party Advisory
58667http://secunia.com/advisories/58667SECUNIAThird Party Advisory
58713http://secunia.com/advisories/58713SECUNIAThird Party Advisory
58714http://secunia.com/advisories/58714SECUNIAThird Party Advisory
58716http://secunia.com/advisories/58716SECUNIAThird Party Advisory
58719http://secunia.com/advisories/58719SECUNIAThird Party Advisory
58742http://secunia.com/advisories/58742SECUNIAThird Party Advisory
58743http://secunia.com/advisories/58743SECUNIAThird Party Advisory
58745http://secunia.com/advisories/58745SECUNIAThird Party Advisory
58759http://secunia.com/advisories/58759SECUNIAThird Party Advisory
58930http://secunia.com/advisories/58930SECUNIAThird Party Advisory
58939http://secunia.com/advisories/58939SECUNIAThird Party Advisory
58945http://secunia.com/advisories/58945SECUNIAThird Party Advisory
58977http://secunia.com/advisories/58977SECUNIAThird Party Advisory
59004http://secunia.com/advisories/59004SECUNIAThird Party Advisory
59012http://secunia.com/advisories/59012SECUNIAThird Party Advisory
59040http://secunia.com/advisories/59040SECUNIAThird Party Advisory
59043http://secunia.com/advisories/59043SECUNIAThird Party Advisory
59055http://secunia.com/advisories/59055SECUNIAThird Party Advisory
59063http://secunia.com/advisories/59063SECUNIAThird Party Advisory
59093http://secunia.com/advisories/59093SECUNIAThird Party Advisory
59101http://secunia.com/advisories/59101SECUNIAThird Party Advisory
59120http://secunia.com/advisories/59120SECUNIAThird Party Advisory
59126http://secunia.com/advisories/59126SECUNIAThird Party Advisory
59132http://secunia.com/advisories/59132SECUNIAThird Party Advisory
59135http://secunia.com/advisories/59135SECUNIAThird Party Advisory
59142http://secunia.com/advisories/59142SECUNIAThird Party Advisory
59162http://secunia.com/advisories/59162SECUNIAThird Party Advisory
59163http://secunia.com/advisories/59163SECUNIAThird Party Advisory
59167http://secunia.com/advisories/59167SECUNIAThird Party Advisory
59175http://secunia.com/advisories/59175SECUNIAThird Party Advisory
59186http://secunia.com/advisories/59186SECUNIAThird Party Advisory
59188http://secunia.com/advisories/59188SECUNIAThird Party Advisory
59189http://secunia.com/advisories/59189SECUNIAThird Party Advisory
59190http://secunia.com/advisories/59190SECUNIAThird Party Advisory
59191http://secunia.com/advisories/59191SECUNIAThird Party Advisory
59192http://secunia.com/advisories/59192SECUNIAThird Party Advisory
59202http://secunia.com/advisories/59202SECUNIAThird Party Advisory
59211http://secunia.com/advisories/59211SECUNIAThird Party Advisory
59214http://secunia.com/advisories/59214SECUNIAThird Party Advisory
59215http://secunia.com/advisories/59215SECUNIAThird Party Advisory
59223http://secunia.com/advisories/59223SECUNIAThird Party Advisory
59231http://secunia.com/advisories/59231SECUNIAThird Party Advisory
59264http://secunia.com/advisories/59264SECUNIAThird Party Advisory
59282http://secunia.com/advisories/59282SECUNIAThird Party Advisory
59284http://secunia.com/advisories/59284SECUNIAThird Party Advisory
59287http://secunia.com/advisories/59287SECUNIAThird Party Advisory
59300http://secunia.com/advisories/59300SECUNIAThird Party Advisory
59301http://secunia.com/advisories/59301SECUNIAThird Party Advisory
59305http://secunia.com/advisories/59305SECUNIAThird Party Advisory
59306http://secunia.com/advisories/59306SECUNIAThird Party Advisory
59310http://secunia.com/advisories/59310SECUNIAThird Party Advisory
59325http://secunia.com/advisories/59325SECUNIAThird Party Advisory
59338http://secunia.com/advisories/59338SECUNIAThird Party Advisory
59342http://secunia.com/advisories/59342SECUNIAThird Party Advisory
59347http://secunia.com/advisories/59347SECUNIAThird Party Advisory
59354http://secunia.com/advisories/59354SECUNIAThird Party Advisory
59362http://secunia.com/advisories/59362SECUNIAThird Party Advisory
59364http://secunia.com/advisories/59364SECUNIAThird Party Advisory
59365http://secunia.com/advisories/59365SECUNIAThird Party Advisory
59368http://secunia.com/advisories/59368SECUNIAThird Party Advisory
59370http://secunia.com/advisories/59370SECUNIAThird Party Advisory
59374http://secunia.com/advisories/59374SECUNIAThird Party Advisory
59375http://secunia.com/advisories/59375SECUNIAThird Party Advisory
59380http://secunia.com/advisories/59380SECUNIAThird Party Advisory
59383http://secunia.com/advisories/59383SECUNIAThird Party Advisory
59389http://secunia.com/advisories/59389SECUNIAThird Party Advisory
59413http://secunia.com/advisories/59413SECUNIAThird Party Advisory
59429http://secunia.com/advisories/59429SECUNIAThird Party Advisory
59435http://secunia.com/advisories/59435SECUNIAThird Party Advisory
59437http://secunia.com/advisories/59437SECUNIAThird Party Advisory
59438http://secunia.com/advisories/59438SECUNIAThird Party Advisory
59440http://secunia.com/advisories/59440SECUNIAThird Party Advisory
59441http://secunia.com/advisories/59441SECUNIAThird Party Advisory
59442http://secunia.com/advisories/59442SECUNIAThird Party Advisory
59444http://secunia.com/advisories/59444SECUNIAThird Party Advisory
59445http://secunia.com/advisories/59445SECUNIAThird Party Advisory
59446http://secunia.com/advisories/59446SECUNIAThird Party Advisory
59447http://secunia.com/advisories/59447SECUNIAThird Party Advisory
59448http://secunia.com/advisories/59448SECUNIAThird Party Advisory
59449http://secunia.com/advisories/59449SECUNIAThird Party Advisory
59450http://secunia.com/advisories/59450SECUNIAThird Party Advisory
59451http://secunia.com/advisories/59451SECUNIAThird Party Advisory
59454http://secunia.com/advisories/59454SECUNIAThird Party Advisory
59459http://secunia.com/advisories/59459SECUNIAThird Party Advisory
59460http://secunia.com/advisories/59460SECUNIAThird Party Advisory
59483http://secunia.com/advisories/59483SECUNIAThird Party Advisory
59490http://secunia.com/advisories/59490SECUNIAThird Party Advisory
59491http://secunia.com/advisories/59491SECUNIAThird Party Advisory
59495http://secunia.com/advisories/59495SECUNIAThird Party Advisory
59502http://secunia.com/advisories/59502SECUNIAThird Party Advisory
59506http://secunia.com/advisories/59506SECUNIAThird Party Advisory
59514http://secunia.com/advisories/59514SECUNIAThird Party Advisory
59518http://secunia.com/advisories/59518SECUNIAThird Party Advisory
59525http://secunia.com/advisories/59525SECUNIAThird Party Advisory
59528http://secunia.com/advisories/59528SECUNIAThird Party Advisory
59529http://secunia.com/advisories/59529SECUNIAThird Party Advisory
59530http://secunia.com/advisories/59530SECUNIAThird Party Advisory
59589http://secunia.com/advisories/59589SECUNIAThird Party Advisory
59602http://secunia.com/advisories/59602SECUNIAThird Party Advisory
59655http://secunia.com/advisories/59655SECUNIAThird Party Advisory
59659http://secunia.com/advisories/59659SECUNIAThird Party Advisory
59661http://secunia.com/advisories/59661SECUNIAThird Party Advisory
59666http://secunia.com/advisories/59666SECUNIAThird Party Advisory
59669http://secunia.com/advisories/59669SECUNIAThird Party Advisory
59677http://secunia.com/advisories/59677SECUNIAThird Party Advisory
59721http://secunia.com/advisories/59721SECUNIAThird Party Advisory
59784http://secunia.com/advisories/59784SECUNIAThird Party Advisory
59824http://secunia.com/advisories/59824SECUNIAThird Party Advisory
59827http://secunia.com/advisories/59827SECUNIAThird Party Advisory
59878http://secunia.com/advisories/59878SECUNIAThird Party Advisory
59885http://secunia.com/advisories/59885SECUNIAThird Party Advisory
59894http://secunia.com/advisories/59894SECUNIAThird Party Advisory
59916http://secunia.com/advisories/59916SECUNIAThird Party Advisory
59990http://secunia.com/advisories/59990SECUNIAThird Party Advisory
60049http://secunia.com/advisories/60049SECUNIAThird Party Advisory
60066http://secunia.com/advisories/60066SECUNIAThird Party Advisory
60176http://secunia.com/advisories/60176SECUNIAThird Party Advisory
60522http://secunia.com/advisories/60522SECUNIAThird Party Advisory
60567http://secunia.com/advisories/60567SECUNIAThird Party Advisory
60571http://secunia.com/advisories/60571SECUNIAThird Party Advisory
60577http://secunia.com/advisories/60577SECUNIAThird Party Advisory
60819http://secunia.com/advisories/60819SECUNIAThird Party Advisory
61254http://secunia.com/advisories/61254SECUNIAThird Party Advisory
61815http://secunia.com/advisories/61815SECUNIAThird Party Advisory
GLSA-201407-05http://security.gentoo.org/glsa/glsa-201407-05.xmlGENTOOThird Party Advisory
http://support.apple.com/kb/HT6443http://support.apple.com/kb/HT6443CONFIRMThird Party Advisory
http://support.citrix.com/article/CTX140876http://support.citrix.com/article/CTX140876CONFIRMThird Party Advisory
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.htmlhttp://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.htmlCONFIRMThird Party Advisory
20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Productshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-opensslCISCOThird Party Advisory
http://www.blackberry.com/btsc/KB36051http://www.blackberry.com/btsc/KB36051CONFIRMThird Party Advisory
http://www.fortiguard.com/advisory/FG-IR-14-018/http://www.fortiguard.com/advisory/FG-IR-14-018/CONFIRMThird Party Advisory
http://www.f-secure.com/en/web/labs_global/fsc-2014-6http://www.f-secure.com/en/web/labs_global/fsc-2014-6CONFIRMThird Party Advisory
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htmhttp://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htmCONFIRMThird Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg3T1020948http://www.ibm.com/support/docview.wss?uid=isg3T1020948CONFIRMBroken Link
http://www.ibm.com/support/docview.wss?uid=ssg1S1004678http://www.ibm.com/support/docview.wss?uid=ssg1S1004678CONFIRMThird Party Advisory
IT02314http://www.ibm.com/support/docview.wss?uid=swg1IT02314AIXAPARThird Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21676356http://www.ibm.com/support/docview.wss?uid=swg21676356CONFIRMThird Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21676793http://www.ibm.com/support/docview.wss?uid=swg21676793CONFIRMBroken Link
http://www.ibm.com/support/docview.wss?uid=swg21676877http://www.ibm.com/support/docview.wss?uid=swg21676877CONFIRMThird Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg24037783http://www.ibm.com/support/docview.wss?uid=swg24037783CONFIRMThird Party Advisory
http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdfhttp://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdfCONFIRMThird Party Advisory
VU#978508http://www.kb.cert.org/vuls/id/978508CERT-VNThird Party Advisory US Government Resource
http://www.kerio.com/support/kerio-control/release-historyhttp://www.kerio.com/support/kerio-control/release-historyCONFIRMThird Party Advisory
MDVSA-2014:105http://www.mandriva.com/security/advisories?name=MDVSA-2014:105MANDRIVAThird Party Advisory
MDVSA-2014:106http://www.mandriva.com/security/advisories?name=MDVSA-2014:106MANDRIVAThird Party Advisory
MDVSA-2015:062http://www.mandriva.com/security/advisories?name=MDVSA-2015:062MANDRIVAThird Party Advisory
http://www.novell.com/support/kb/doc.php?id=7015264http://www.novell.com/support/kb/doc.php?id=7015264CONFIRMThird Party Advisory
http://www.novell.com/support/kb/doc.php?id=7015300http://www.novell.com/support/kb/doc.php?id=7015300CONFIRMThird Party Advisory
http://www.openssl.org/news/secadv_20140605.txthttp://www.openssl.org/news/secadv_20140605.txtCONFIRMVendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlCONFIRMPatch
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlCONFIRMThird Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlCONFIRMPatch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlCONFIRMThird Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlCONFIRMThird Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlhttp://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlCONFIRMThird Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlhttp://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlCONFIRMThird Party Advisory
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilitieshttp://www.securityfocus.com/archive/1/534161/100/0/threadedBUGTRAQNot Applicable
1031032http://www.securitytracker.com/id/1031032SECTRACKThird Party Advisory VDB Entry
1031594http://www.securitytracker.com/id/1031594SECTRACKThird Party Advisory VDB Entry
http://www.splunk.com/view/SP-CAAAM2Dhttp://www.splunk.com/view/SP-CAAAM2DCONFIRMThird Party Advisory
http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-downloadhttp://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-downloadCONFIRMThird Party Advisory
http://www.vmware.com/security/advisories/VMSA-2014-0006.htmlhttp://www.vmware.com/security/advisories/VMSA-2014-0006.htmlCONFIRMThird Party Advisory
http://www.vmware.com/security/advisories/VMSA-2014-0012.htmlhttp://www.vmware.com/security/advisories/VMSA-2014-0012.htmlCONFIRMThird Party Advisory
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg400001841http://www-01.ibm.com/support/docview.wss?uid=isg400001841CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg400001843http://www-01.ibm.com/support/docview.wss?uid=isg400001843CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690CONFIRMThird Party Advisory
IV61506http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506AIXAPARThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21673137http://www-01.ibm.com/support/docview.wss?uid=swg21673137CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21675626http://www-01.ibm.com/support/docview.wss?uid=swg21675626CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21675821http://www-01.ibm.com/support/docview.wss?uid=swg21675821CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676035http://www-01.ibm.com/support/docview.wss?uid=swg21676035CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676062http://www-01.ibm.com/support/docview.wss?uid=swg21676062CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676071http://www-01.ibm.com/support/docview.wss?uid=swg21676071CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676333http://www-01.ibm.com/support/docview.wss?uid=swg21676333CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676334http://www-01.ibm.com/support/docview.wss?uid=swg21676334CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676419http://www-01.ibm.com/support/docview.wss?uid=swg21676419CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676478http://www-01.ibm.com/support/docview.wss?uid=swg21676478CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676496http://www-01.ibm.com/support/docview.wss?uid=swg21676496CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676501http://www-01.ibm.com/support/docview.wss?uid=swg21676501CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676529http://www-01.ibm.com/support/docview.wss?uid=swg21676529CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676536http://www-01.ibm.com/support/docview.wss?uid=swg21676536CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676615http://www-01.ibm.com/support/docview.wss?uid=swg21676615CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676644http://www-01.ibm.com/support/docview.wss?uid=swg21676644CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676655http://www-01.ibm.com/support/docview.wss?uid=swg21676655CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676786http://www-01.ibm.com/support/docview.wss?uid=swg21676786CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676833http://www-01.ibm.com/support/docview.wss?uid=swg21676833CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676845http://www-01.ibm.com/support/docview.wss?uid=swg21676845CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676879http://www-01.ibm.com/support/docview.wss?uid=swg21676879CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676889http://www-01.ibm.com/support/docview.wss?uid=swg21676889CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677080http://www-01.ibm.com/support/docview.wss?uid=swg21677080CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677131http://www-01.ibm.com/support/docview.wss?uid=swg21677131CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677390http://www-01.ibm.com/support/docview.wss?uid=swg21677390CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677527http://www-01.ibm.com/support/docview.wss?uid=swg21677527CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677567http://www-01.ibm.com/support/docview.wss?uid=swg21677567CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677695http://www-01.ibm.com/support/docview.wss?uid=swg21677695CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677828http://www-01.ibm.com/support/docview.wss?uid=swg21677828CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677836http://www-01.ibm.com/support/docview.wss?uid=swg21677836CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21678167http://www-01.ibm.com/support/docview.wss?uid=swg21678167CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21678233http://www-01.ibm.com/support/docview.wss?uid=swg21678233CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21678289http://www-01.ibm.com/support/docview.wss?uid=swg21678289CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21683332http://www-01.ibm.com/support/docview.wss?uid=swg21683332CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg24037727http://www-01.ibm.com/support/docview.wss?uid=swg24037727CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg24037729http://www-01.ibm.com/support/docview.wss?uid=swg24037729CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg24037730http://www-01.ibm.com/support/docview.wss?uid=swg24037730CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg24037731http://www-01.ibm.com/support/docview.wss?uid=swg24037731CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg24037732http://www-01.ibm.com/support/docview.wss?uid=swg24037732CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg24037761http://www-01.ibm.com/support/docview.wss?uid=swg24037761CONFIRMThird Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg24037870http://www-01.ibm.com/support/docview.wss?uid=swg24037870CONFIRMThird Party Advisory
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=Ehttp://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=ECONFIRMThird Party Advisory
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=Ehttp://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=ECONFIRMThird Party Advisory
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737CONFIRMThird Party Advisory
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740CONFIRMThird Party Advisory
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754CONFIRMThird Party Advisory
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755CONFIRMThird Party Advisory
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756CONFIRMThird Party Advisory
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757CONFIRMThird Party Advisory
https://access.redhat.com/site/blogs/766093/posts/908133https://access.redhat.com/site/blogs/766093/posts/908133CONFIRMThird Party Advisory
https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issueshttps://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issuesCONFIRMThird Party Advisory
https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1CONFIRMThird Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1103586https://bugzilla.redhat.com/show_bug.cgi?id=1103586CONFIRMIssue Tracking
https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdfhttps://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdfCONFIRMThird Party Advisory
https://discussions.nessus.org/thread/7517https://discussions.nessus.org/thread/7517CONFIRMThird Party Advisory
https://filezilla-project.org/versions.php?type=serverhttps://filezilla-project.org/versions.php?type=serverCONFIRMThird Party Advisory
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441CONFIRMPatch Vendor Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946CONFIRMThird Party Advisory
https://kb.bluecoat.com/index?page=content&id=SA80https://kb.bluecoat.com/index?page=content&id=SA80CONFIRMThird Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10075https://kc.mcafee.com/corporate/index?page=content&id=SB10075CONFIRMThird Party Advisory
https://www.ibm.com/support/docview.wss?uid=ssg1S1004670https://www.ibm.com/support/docview.wss?uid=ssg1S1004670CONFIRMThird Party Advisory
https://www.ibm.com/support/docview.wss?uid=ssg1S1004671https://www.ibm.com/support/docview.wss?uid=ssg1S1004671CONFIRMThird Party Advisory
https://www.imperialviolet.org/2014/06/05/earlyccs.htmlhttps://www.imperialviolet.org/2014/06/05/earlyccs.htmlMISCExploit
https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdfhttps://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.CONFIRMThird Party Advisory
https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdfhttps://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_WindowCONFIRMThird Party Advisory
https://www.novell.com/support/kb/doc.php?id=7015271https://www.novell.com/support/kb/doc.php?id=7015271CONFIRMThird Party Advisory