CVE编号
CVE-2014-0160利用情况
漏洞武器化补丁情况
官方补丁披露时间
2014-04-08漏洞描述
OpenSSL是一款开放源码的SSL实现,用来实现网络通信的高强度加密。OpenSSL TLS和DTLS扩展包处理存在外界读内存泄露漏洞。由于程序未能正确处理Heartbeart扩展包,允许远程攻击者可以通过制作的数据包,读取服务器内存中的敏感信息(如用户名、密码、Cookie、私钥等)。 仅OpenSSL的1.0.1及1.0.2-beta版本受到影响,包括:1.0.1f及1.0.2-beta1版本。
解决建议
用户可参考如下供应商提供的安全公告获得补丁信息:http://arstechnica.com/security/2014/04/critical-crypto-bug-in-openssl-opens-two-thirds-of-the-web-to-eavesdropping/
参考链接 |
|
---|---|
http://advisories.mageia.org/MGASA-2014-0165.html | |
http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/ | |
http://cogentdatahub.com/ReleaseNotes.html | |
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01 | |
http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96db9023b881d7cd9f379... | |
http://heartbleed.com/ | |
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html | |
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html | |
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html | |
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html | |
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html | |
http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html | |
http://marc.info/?l=bugtraq&m=139722163017074&w=2 | |
http://marc.info/?l=bugtraq&m=139757726426985&w=2 | |
http://marc.info/?l=bugtraq&m=139757819327350&w=2 | |
http://marc.info/?l=bugtraq&m=139757919027752&w=2 | |
http://marc.info/?l=bugtraq&m=139758572430452&w=2 | |
http://marc.info/?l=bugtraq&m=139765756720506&w=2 | |
http://marc.info/?l=bugtraq&m=139774054614965&w=2 | |
http://marc.info/?l=bugtraq&m=139774703817488&w=2 | |
http://marc.info/?l=bugtraq&m=139808058921905&w=2 | |
http://marc.info/?l=bugtraq&m=139817685517037&w=2 | |
http://marc.info/?l=bugtraq&m=139817727317190&w=2 | |
http://marc.info/?l=bugtraq&m=139817782017443&w=2 | |
http://marc.info/?l=bugtraq&m=139824923705461&w=2 | |
http://marc.info/?l=bugtraq&m=139824993005633&w=2 | |
http://marc.info/?l=bugtraq&m=139833395230364&w=2 | |
http://marc.info/?l=bugtraq&m=139835815211508&w=2 | |
http://marc.info/?l=bugtraq&m=139835844111589&w=2 | |
http://marc.info/?l=bugtraq&m=139836085512508&w=2 | |
http://marc.info/?l=bugtraq&m=139842151128341&w=2 | |
http://marc.info/?l=bugtraq&m=139843768401936&w=2 | |
http://marc.info/?l=bugtraq&m=139869720529462&w=2 | |
http://marc.info/?l=bugtraq&m=139869891830365&w=2 | |
http://marc.info/?l=bugtraq&m=139889113431619&w=2 | |
http://marc.info/?l=bugtraq&m=139889295732144&w=2 | |
http://marc.info/?l=bugtraq&m=139905202427693&w=2 | |
http://marc.info/?l=bugtraq&m=139905243827825&w=2 | |
http://marc.info/?l=bugtraq&m=139905295427946&w=2 | |
http://marc.info/?l=bugtraq&m=139905351928096&w=2 | |
http://marc.info/?l=bugtraq&m=139905405728262&w=2 | |
http://marc.info/?l=bugtraq&m=139905458328378&w=2 | |
http://marc.info/?l=bugtraq&m=139905653828999&w=2 | |
http://marc.info/?l=bugtraq&m=139905868529690&w=2 | |
http://marc.info/?l=bugtraq&m=140015787404650&w=2 | |
http://marc.info/?l=bugtraq&m=140075368411126&w=2 | |
http://marc.info/?l=bugtraq&m=140724451518351&w=2 | |
http://marc.info/?l=bugtraq&m=140752315422991&w=2 | |
http://marc.info/?l=bugtraq&m=141287864628122&w=2 | |
http://marc.info/?l=bugtraq&m=142660345230545&w=2 | |
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1 | |
http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3 | |
http://rhn.redhat.com/errata/RHSA-2014-0376.html | |
http://rhn.redhat.com/errata/RHSA-2014-0377.html | |
http://rhn.redhat.com/errata/RHSA-2014-0378.html | |
http://rhn.redhat.com/errata/RHSA-2014-0396.html | |
http://seclists.org/fulldisclosure/2014/Apr/109 | |
http://seclists.org/fulldisclosure/2014/Apr/173 | |
http://seclists.org/fulldisclosure/2014/Apr/190 | |
http://seclists.org/fulldisclosure/2014/Apr/90 | |
http://seclists.org/fulldisclosure/2014/Apr/91 | |
http://seclists.org/fulldisclosure/2014/Dec/23 | |
http://secunia.com/advisories/57347 | |
http://secunia.com/advisories/57483 | |
http://secunia.com/advisories/57721 | |
http://secunia.com/advisories/57836 | |
http://secunia.com/advisories/57966 | |
http://secunia.com/advisories/57968 | |
http://secunia.com/advisories/59139 | |
http://secunia.com/advisories/59243 | |
http://secunia.com/advisories/59347 | |
http://support.citrix.com/article/CTX140605 | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa... | |
http://www-01.ibm.com/support/docview.wss?uid=isg400001841 | |
http://www-01.ibm.com/support/docview.wss?uid=isg400001843 | |
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21670161 | |
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf | |
http://www.blackberry.com/btsc/KB35882 | |
http://www.debian.org/security/2014/dsa-2896 | |
http://www.exploit-db.com/exploits/32745 | |
http://www.exploit-db.com/exploits/32764 | |
http://www.f-secure.com/en/web/labs_global/fsc-2014-1 | |
http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/ | |
http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/ | |
http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/ | |
http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/ | |
http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf | |
http://www.kb.cert.org/vuls/id/720951 | |
http://www.kerio.com/support/kerio-control/release-history | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 | |
http://www.openssl.org/news/secadv_20140407.txt | |
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html | |
http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0... | |
http://www.securityfocus.com/archive/1/534161/100/0/threaded | |
http://www.securityfocus.com/bid/66690 | |
http://www.securitytracker.com/id/1030026 | |
http://www.securitytracker.com/id/1030074 | |
http://www.securitytracker.com/id/1030077 | |
http://www.securitytracker.com/id/1030078 | |
http://www.securitytracker.com/id/1030079 | |
http://www.securitytracker.com/id/1030080 | |
http://www.securitytracker.com/id/1030081 | |
http://www.securitytracker.com/id/1030082 | |
http://www.splunk.com/view/SP-CAAAMB3 | |
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=secu... | |
http://www.ubuntu.com/usn/USN-2165-1 | |
http://www.us-cert.gov/ncas/alerts/TA14-098A | |
http://www.vmware.com/security/advisories/VMSA-2014-0012.html | |
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in... | |
https://blog.torproject.org/blog/openssl-bug-cve-2014-0160 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1084875 | |
https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf | |
https://code.google.com/p/mod-spdy/issues/detail?id=85 | |
https://filezilla-project.org/versions.php?type=server | |
https://gist.github.com/chapmajs/10473815 | |
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDispla... | |
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883a... | |
https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c1... | |
https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b40... | |
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3... | |
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html | |
https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html | |
https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html | |
https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217 | |
https://www.cert.fi/en/reports/2014/vulnerability788210.html | |
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-securit... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | filezilla-project | filezilla_server | * |
Up to (excluding) 0.9.44 |
|||||
运行在以下环境 | |||||||||
应用 | mitel | micollab | 6.0 | - | |||||
运行在以下环境 | |||||||||
应用 | mitel | micollab | 7.0 | - | |||||
运行在以下环境 | |||||||||
应用 | mitel | micollab | 7.1 | - | |||||
运行在以下环境 | |||||||||
应用 | mitel | micollab | 7.2 | - | |||||
运行在以下环境 | |||||||||
应用 | mitel | micollab | 7.3 | - | |||||
运行在以下环境 | |||||||||
应用 | mitel | micollab | 7.3.0.104 | - | |||||
运行在以下环境 | |||||||||
应用 | mitel | mivoice | 1.1.2.5 | - | |||||
运行在以下环境 | |||||||||
应用 | mitel | mivoice | 1.1.3.3 | - | |||||
运行在以下环境 | |||||||||
应用 | mitel | mivoice | 1.2.0.11 | - | |||||
运行在以下环境 | |||||||||
应用 | mitel | mivoice | 1.3.2.2 | - | |||||
运行在以下环境 | |||||||||
应用 | mitel | mivoice | 1.4.0.102 | - | |||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | * |
From (including) 1.0.1 |
Up to (excluding) 1.0.1g |
||||
运行在以下环境 | |||||||||
应用 | redhat | gluster_storage | 2.1 | - | |||||
运行在以下环境 | |||||||||
应用 | redhat | storage | 2.1 | - | |||||
运行在以下环境 | |||||||||
应用 | siemens | elan-8.2 | * |
Up to (excluding) 8.3.3 |
|||||
运行在以下环境 | |||||||||
应用 | siemens | wincc_open_architecture | 3.12 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 1.0.1g-1 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_6 | openssl | * |
Up to (excluding) 0:1.0.1e-16.el6_5.7 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12 | libopenssl1_0_0 | * |
Up to (excluding) 1.0.1i-2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_12.04.5_lts | openssl | * |
Up to (excluding) 1.0.1-4ubuntu5.12 |
|||||
- 攻击路径 远程
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 漏洞武器化
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 传输被破坏
- 服务器危害 服务器失陷
- 全网数量 10000
还没有评论,来说两句吧...