5.8
CVSSv2

CVE-2014-0224

Published: 05/06/2014 Updated: 07/11/2023
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.4 | Impact Score: 5.2 | Exploitability Score: 2.2
VMScore: 618
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

OpenSSL prior to 0.9.8za, 1.0.0 prior to 1.0.0m, and 1.0.1 prior to 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle malicious users to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl

redhat jboss enterprise web platform 5.2.0

redhat enterprise linux 6.0

redhat storage 2.1

redhat enterprise linux 4

redhat enterprise linux 5

redhat jboss enterprise web server 2.0.1

redhat jboss enterprise application platform 5.2.0

fedoraproject fedora 20

redhat jboss enterprise application platform 6.2.3

fedoraproject fedora 19

opensuse opensuse 13.1

opensuse opensuse 13.2

filezilla-project filezilla server

siemens application_processing_engine_firmware

siemens cp1543-1_firmware

siemens s7-1500_firmware

siemens rox_firmware

mariadb mariadb

python python

nodejs node.js

Vendor Advisories

Debian Bug report logs - #775888 virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427 Package: virtualbox; Maintainer for virtualbox is Debian Virtualbox Team <team+debian-virtualbox@trackerdebianorg>; Source for virtualbox is src:virtualbox (PTS, buildd, popcon) Reported by: Mori ...
Debian Bug report logs - #750665 openssl: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470 Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Jeff Ballard < ...
Multiple vulnerabilities have been discovered in OpenSSL: CVE-2014-0195 Jueri Aedla discovered that a buffer overflow in processing DTLS fragments could lead to the execution of arbitrary code or denial of service CVE-2014-0221 Imre Rad discovered the processing of DTLS hello packets is susceptible to denial of service CVE-20 ...
Several security issues were fixed in OpenSSL ...
USN-2232-1 introduced a regression in OpenSSL ...
USN-2232-1 introduced a regression in OpenSSL ...
USN-2232-1 introduced a regression in OpenSSL ...
It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server (CVE-2014-0224) Note: In order to exploit this flaw, both the server and the client must ...
It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server (CVE-2014-0224) ...
It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server (CVE-2014-0224) ...
It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server ...
Multiple products from Tenable Network Security are vulnerable to the recently disclosed OpenSSL 'CCS Injection' vulnerability as they bundle affected versions of the software The flaw in OpenSSL is due to a flaw in the handshake process With a carefully crafted handshake, a remote attacker can force the client or server to use weak keying mate ...
A potential security vulnerability has been identified with certain HP LaserJet Printers, MFPs and certain HP OfficeJet Enterprise Printers using OpenSSL The vulnerability could be exploited remotely to allow remote unauthorized access Note: This OpenSSL vulnerability was detected in specific OpenSSL versions OpenSSL is a 3rd party product th ...
A potential security vulnerability has been identified with certain HP LaserJet Printers, MFPs and certain HP OfficeJet Enterprise Printers using OpenSSL The vulnerability could be exploited remotely to allow remote unauthorized access Note: This OpenSSL vulnerability was detected in specific OpenSSL versions OpenSSL is a 3rd party product th ...
Overview The OpenSSL security advisory released on the 5th of June 2014 disclosed six security vulnerabilities in this open source component; these are described below: • CVE-2014-0224: SSL/TLS MITM vulnerability • CVE-2014-0221: DTLS recursion flaw • CVE-2014-0195: DTLS invalid fragment vulnerability • CVE-2014-0198: SSL_MODE_RELEASE_BUFFE ...

Nmap Scripts

ssl-ccs-injection

Detects whether a server is vulnerable to the SSL/TLS "CCS Injection" vulnerability (CVE-2014-0224), first discovered by Masashi Kikuchi. The script is based on the ccsinjection.c code authored by Ramon de C Valle (https://gist.github.com/rcvalle/71f4b027d61a78c42607)

nmap -p 443 --script ssl-ccs-injection <target>

PORT STATE SERVICE 443/tcp open https | ssl-ccs-injection: | VULNERABLE: | SSL/TLS MITM vulnerability (CCS Injection) | State: VULNERABLE | Risk factor: High | Description: | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before | 1.0.1h does not properly restrict processing of ChangeCipherSpec | messages, which allows man-in-the-middle attackers to trigger use | of a zero-length master key in certain OpenSSL-to-OpenSSL | communications, and consequently hijack sessions or obtain | sensitive information, via a crafted TLS handshake, aka the | "CCS Injection" vulnerability. | | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 | http://www.cvedetails.com/cve/2014-0224 |_ http://www.openssl.org/news/secadv_20140605.txt
ssl-ccs-injection

Detects whether a server is vulnerable to the SSL/TLS "CCS Injection" vulnerability (CVE-2014-0224), first discovered by Masashi Kikuchi. The script is based on the ccsinjection.c code authored by Ramon de C Valle (https://gist.github.com/rcvalle/71f4b027d61a78c42607)

nmap -p 443 --script ssl-ccs-injection <target>

PORT STATE SERVICE 443/tcp open https | ssl-ccs-injection: | VULNERABLE: | SSL/TLS MITM vulnerability (CCS Injection) | State: VULNERABLE | Risk factor: High | Description: | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before | 1.0.1h does not properly restrict processing of ChangeCipherSpec | messages, which allows man-in-the-middle attackers to trigger use | of a zero-length master key in certain OpenSSL-to-OpenSSL | communications, and consequently hijack sessions or obtain | sensitive information, via a crafted TLS handshake, aka the | "CCS Injection" vulnerability. | | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 | http://www.cvedetails.com/cve/2014-0224 |_ http://www.openssl.org/news/secadv_20140605.txt

Github Repositories

A Simple, Secured Default HTTP(S) Server for Golang

Go secureserver Out-of-the-box, Go is a fully capable HTTP/HTTPS server However, it is not configured correctly to avoid malicious clients, timeouts, or even simple SSL auto setup with LetsEncryptorg This repository exists to help go developers launch a secure, simple HTTPS server This configuration blocks major attacks like: BEAST attack POODLE (SSLv3) POODLE (TLS) Heartb

capacitor-plugin-security-provider Capacitor plugin with methods to check and update the Android Security Provider Android relies on a security Provider to provide secure network communications However, from time to time, vulnerabilities are found in the default security provider To protect against these vulnerabilities, Google Play services provides a way to automatically u

SSLazy SSL grader Run&gt; python3 sslgraderpy #wwwexamplecom# (on Kali only) To-do: add Windows support, UTF-8 Output, argument checking, threading, element sanitisation ,more error checking/controls (good enough to run) On Github, there are many SSLLab API SSL grading scripts and independent SSL checker scripts But all of them (as of Q2 2021) do not cover TLS 13 gradi

Donate if you want wwwpaypalme/compilenix How it looks Slack CLI All config settings (or defaults via Configexamplejs) are overwritten by cli parameters! node indexjs --enableSlack false --domains wwwmicrosoftcom,expiredbadsslcom --ignore Expire,PubKeySize Usage install nvm (githubcom/creationix/nvm) install c/

OpenBSD httpd configuration for perfect TLS SSL Labs score A+

OpenBSD httpd TLS Let's Encrypt configuration for perfect A+ SSLLabs score OpenBSD httpd configuration for perfect TLS SSL Labs score A+ with Let's Encrypt (acme-client) Use this httpd config file Tested on OpenBSD 68 Server Key and Certificate #1 Setting Variable Subject cryptsuscom Fingerprint SHA256 a4b481ad06b99a4a32919f2d5c8f48291bdc4d15878261963aa

This is a tool to test servers for CVE-2014-0224 To build: $ export GOPATH=$(pwd) $ go build clientgo To run: $ /client examplecom:443 examplecom:443 is not vulnerable

With best practices under your fingertips, you will not lose precious time on reinventing the wheel. Instead, you can focus on writing quality code and getting the job done.

Title: Android Development | Best Practices Introduction Android development continues to dominate the world of mobile development Fun projects, great pay, and tons of job prospects are just some of the reasons developers are starting their journeys into the exciting world of the Android operating system Some experts say that there has never been a better time to learn Andro

Title: Android Development | Best Practices Introduction Android development continues to dominate the world of mobile development Fun projects, great pay, and tons of job prospects are just some of the reasons developers are starting their journeys into the exciting world of the Android operating system Some experts say that there has never been a better time to learn Andro

Capacitor plugin with method to check and update the Android Security Provider.

Android Security Provider @capacitor-community/security-provider Check and update the Android Security Provider in a Capacitor app About Capacitor plugin with a method to check and update the Android Security Provider Android relies on a security Provider to provide secure network communications However, from time to time, vulnerabilities are found in

OPENSSL CVE-2014-0224 MITM exploit demo Author : @bluerust Blog : hibaiducom/bluerust/item/bf2ab031bbadcf09cfb9fe41 Ver : 11 Desc : Only for openssl 101*, only tested for cipher RC4-SHA a server openssl s_server -debug -accept 443 -cert servercrt -certform PEM -key serverkey -cipher RC4-SHA we don't want to discuss how to generate the certificate i

Used for evaluating hosts for CVE-2014-0224

Evaluates hosts for CVE-2014-0224 vulnerability cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2014-0224 Usage: ccs-evalpy list-of-hoststxt -Takes in a list of hosts, line seperated Checks the host for common SSL ports using nmap Peforms PoC injection test supplied by RedHat (fake-client-early-ccspl) Writes results to "local-results-list-of-hoststxt"

This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv1.1, and TLSv1.2) advertising a comprehensive set of ciphers.

OpenSSL CCS Inject Test This script is designed for detection of vulnerable servers (CVE-2014-0224) in a wide range of configurations It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv11, and TLSv12) advertising a comprehensive set of ciphers Changes: v01 - Updated receive buffer sizes to account for longer certificate messages v02 - Upda

Adam Langley's tool for testing for OpenSSL CVE-2014-0224, originally published here: wwwimperialvioletorg/2014/06/05/earlyccshtml To build the tool: $ export GOPATH=$(pwd) $ go build openssl-ccs-cve-2014-0224go Tested with go 122 and 13 The src/my-tls directory contains the patched version of the crypto/tls package

OpenBSD httpd configuration for perfect TLS SSL Labs score A+

OpenBSD httpd TLS Let's Encrypt configuration for perfect A+ SSLLabs score OpenBSD httpd configuration for perfect TLS SSL Labs score A+ with Let's Encrypt (acme-client) Use this httpd config file Tested on OpenBSD 68 Server Key and Certificate #1 Setting Variable Subject cryptsuscom Fingerprint SHA256 a4b481ad06b99a4a32919f2d5c8f48291bdc4d15878261963aa

OpenBSD httpd configuration for perfect TLS SSL Labs score A+

OpenBSD httpd TLS Let's Encrypt configuration for perfect A+ SSLLabs score OpenBSD httpd configuration for perfect TLS SSL Labs score A+ with Let's Encrypt (acme-client) Use this httpd config file Tested on OpenBSD 68 Server Key and Certificate #1 Setting Variable Subject cryptsuscom Fingerprint SHA256 a4b481ad06b99a4a32919f2d5c8f48291bdc4d15878261963aa

Домашнее задание "Уязвимости и атаки на информационные системы" - Подус Сергей Задание 1 Скачайте и установите виртуальную машину Metasploitable: sourceforgenet/projects/metasploitable/ Это типовая ОС для экспериментов в о

CVE advisories tests

CVE advisories tests CVE-2015-0235 (GHOST) CVE-2014-0224 (OpenSSL CCS injection)

FileZilla Server version 0960 beta Copyright 2001-2017 by Tim Kosse filezilla-projectorg/ FluentFTP Forked for use by FluentFTP on 21/10/2022 Features almost unlimited number of users multi-threaded engine runs as service under Windows Vista, 7, 8, 81 and 10 anti fxp / bounce attack filter secure password storage (as MD5 hash) real-time user/group management all o

Домашнее задание к занятию "21 Системы контроля версий" В каталоге terraform будут проигнорированы файлы: все файлы и каталоги в каталоге terraform файлы, содержащие tfstate файлы с именем crashlog файлы с расширени

CTF machine Writeup

VULNIX writeup nmap -p- Target_ip 2 nmap -sV -A —script vuln Target_ip root@v5ha1i:~# nmap -sV -A --script Vuln 192168122130 Starting Nmap 770 ( nmaporg ) at 2020-06-18 02:23 EDT Nmap scan report for 192168122130 Host is up (00017s latency) Not shown: 988 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 59p1 Debian

Vuls検証環境

laputa なんぞこれ laputa は vuls の機能をお試しで検証するDocker環境です. 様々なOSをセットアップします. centos 7,8 debian 10 ubuntu 18 本来はvulsctlを使うと大変便利ですが vuls を開発しながら使うことを想定しているので 各ツールは make install でローカル環境に導入しています. また,

MassBleed SSL Vulnerability Scanner USAGE: sh massbleedsh [CIDR|IP] [single|port|subnet] [port] [proxy] ABOUT: This script has four main functions with the ability to proxy all connections: To mass scan any CIDR range for OpenSSL vulnerabilities via port 443/tcp (https) (example: sh massbleedsh 19216800/16) To scan any CIDR range f

MassBleed SSL Vulnerability Scanner

MassBleed SSL Vulnerability Scanner USAGE: sh massbleedsh [CIDR|IP] [single|port|subnet] [port] [proxy] ABOUT: This script has four main functions with the ability to proxy all connections: To mass scan any CIDR range for OpenSSL vulnerabilities via port 443/tcp (https) (example: sh massbleedsh 19216800/16) To scan any CIDR range f

SSLazy SSL grader Run&gt; python3 sslgraderpy #wwwexamplecom# (on Kali only) To-do: add Windows support, UTF-8 Output, argument checking, threading, element sanitisation ,more error checking/controls (good enough to run) On Github, there are many SSLLab API SSL grading scripts and independent SSL checker scripts But all of them (as of Q2 2021) do not cover TLS 13 gradi

SSLazy SSL grader Run&gt; python3 sslgraderpy #wwwexamplecom# (on Kali only) To-do: add Windows support, UTF-8 Output, argument checking, threading, element sanitisation ,more error checking/controls (good enough to run) On Github, there are many SSLLab API SSL grading scripts and independent SSL checker scripts But all of them (as of Q2 2021) do not cover TLS 13 gradi

CTF machine Writeup

VULNIX writeup nmap -p- Target_ip 2 nmap -sV -A —script vuln Target_ip root@v5ha1i:~# nmap -sV -A --script Vuln 192168122130 Starting Nmap 770 ( nmaporg ) at 2020-06-18 02:23 EDT Nmap scan report for 192168122130 Host is up (00017s latency) Not shown: 988 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 59p1 Debian

Recent Articles

‘Secure’ criminal justice email system relies on obsolete protocols
The Register • John Leyden • 03 Aug 2015

We're upgrading it anyway. Honest, no really, yawns Ministry of Justice

The Criminal Justice Secure eMail system (CJSM) relies on insecure protocols that some security conscious organisations deliberately block, claims a Register source. CJSM is run by Vodafone on behalf of the government and designed to provide secure communications between the GSI (Government Secure Intranet) and external organisations in the criminal justice field, such as solicitors and police contractors. Security problems with the system came to El Reg’s attention following a tip-off from a ...

How long is too long to wait for a security fix?
The Register • Trevor Pott • 25 Jul 2014

Synology finally patches OpenSSL bugs in Trevor's NAS

Sysadmin blog Synology quietly released version 4.2-3250 of its DiskStation Manager (DSM) operating system this month. This squashes critical security bugs in version 4.2 of DSM – bugs that were fixed in version 5.0 in June, so consider this a back port. Version 4.2 is old but still in use in various models, such as the DS109. The update got me thinking about the security of NASes and similar devices on our networks. New build 3250 addresses a kernel-level security issue as well as the six Ope...

FireEye patches OS, torpedos Exploit-DB disclosure
The Register • Darren Pauli • 10 Jul 2014

Researcher suspended after zero-day dump

FireEye has patched a series of publicly-disclosed flaws in its operating system (FEOS) that facilitated man-in-the-middle attacks and command injection. The vulnerabilities released over June affected versions NX, EX, AX, FX, and CM of the FEOS and were patched in the first individual security bulletin for the system. The company urged customers to apply fixes. "FireEye encourages all customers to upgrade to the most current releases as soon as practical - especially customers running versions ...

Surprise Android 'KitKat' update fixes nasty OpenSSL vuln
The Register • Neil McAllister in San Francisco • 20 Jun 2014

Android 4.4.4 shipping just 18 days after the previous version

Android fans who are hoping Google will debut a new version of the OS at its annual I/O conference in San Francsico next week might be in for a disappointment ... because the company is rolling out a new version this week. On Friday, the Chocolate Factory published firmware images of Android 4.4.4 – yes, we're still talking "KitKat" – for the Nexus 4 and 5 phones and the Nexus 7 and 10 fondleslabs. The build number of the new release is KTU84P. There are no official release notes so far, but...

Patch NOW: Six new bugs found in OpenSSL – including spying hole
The Register • John Leyden • 05 Jun 2014

On a scale of 1 to Heartbleed, this is a 7

The OpenSSL team has pushed out fixes for six security vulnerabilities in the widely used crypto library. These holes include a flaw that enables man-in-the-middle (MITM) eavesdropping on encrypted connections, and another that allows miscreants to drop malware on at-risk systems. A DTLS invalid fragment bug (CVE-2014-0195, affects versions 0.9.8, 1.0.0 and 1.0.1) can be used to inject malicious code into vulnerable software in apps, devices and servers. DTLS is more or less TLS encryption over ...

References

CWE-326http://www.openssl.org/news/secadv_20140605.txthttp://ccsinjection.lepidum.co.jphttp://www.kb.cert.org/vuls/id/978508https://bugzilla.redhat.com/show_bug.cgi?id=1103586https://www.imperialviolet.org/2014/06/05/earlyccs.htmlhttps://access.redhat.com/site/blogs/766093/posts/908133http://secunia.com/advisories/59191http://secunia.com/advisories/58579https://kb.bluecoat.com/index?page=content&id=SA80http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-opensslhttp://www.kerio.com/support/kerio-control/release-historyhttp://secunia.com/advisories/59438http://www-01.ibm.com/support/docview.wss?uid=swg21676035http://secunia.com/advisories/59301http://secunia.com/advisories/59721http://secunia.com/advisories/59491http://secunia.com/advisories/59450http://www-01.ibm.com/support/docview.wss?uid=swg21676845http://secunia.com/advisories/59655http://www-01.ibm.com/support/docview.wss?uid=swg21677695http://secunia.com/advisories/59659http://secunia.com/advisories/58639http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737http://secunia.com/advisories/58759http://www-01.ibm.com/support/docview.wss?uid=swg21678289http://secunia.com/advisories/59043http://secunia.com/advisories/59666http://secunia.com/advisories/59126http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740http://marc.info/?l=bugtraq&m=140499864129699&w=2http://www-01.ibm.com/support/docview.wss?uid=swg21677567http://secunia.com/advisories/59055http://secunia.com/advisories/59490http://www-01.ibm.com/support/docview.wss?uid=swg21676419https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdfhttp://www.novell.com/support/kb/doc.php?id=7015300http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htmhttp://www-01.ibm.com/support/docview.wss?uid=swg21673137http://secunia.com/advisories/59514http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.htmlhttp://secunia.com/advisories/59602http://secunia.com/advisories/59495http://www.novell.com/support/kb/doc.php?id=7015264http://esupport.trendmicro.com/solution/en-US/1103813.aspxhttp://secunia.com/advisories/58930http://secunia.com/advisories/59370http://secunia.com/advisories/59012http://www.blackberry.com/btsc/KB36051http://secunia.com/advisories/58385http://www-01.ibm.com/support/docview.wss?uid=swg21676655http://secunia.com/advisories/59120http://secunia.com/advisories/59162http://secunia.com/advisories/58939http://secunia.com/advisories/59528http://secunia.com/advisories/59063http://www-01.ibm.com/support/docview.wss?uid=swg21677828http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172http://secunia.com/advisories/58128http://www-01.ibm.com/support/docview.wss?uid=swg21676062https://kc.mcafee.com/corporate/index?page=content&id=SB10075http://www-01.ibm.com/support/docview.wss?uid=swg21676496http://www-01.ibm.com/support/docview.wss?uid=swg21678167http://secunia.com/advisories/59442http://secunia.com/advisories/59824http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=Ehttp://www-01.ibm.com/support/docview.wss?uid=swg21677527https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdfhttp://secunia.com/advisories/59827http://secunia.com/advisories/59669http://secunia.com/advisories/59413http://www-01.ibm.com/support/docview.wss?uid=swg24037761http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=Ehttp://www-01.ibm.com/support/docview.wss?uid=swg21677390http://secunia.com/advisories/59300http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690http://secunia.com/advisories/59383http://www.splunk.com/view/SP-CAAAM2Dhttps://discussions.nessus.org/thread/7517http://secunia.com/advisories/59885http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-downloadhttp://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlhttp://secunia.com/advisories/59459http://secunia.com/advisories/58745http://secunia.com/advisories/59530http://secunia.com/advisories/59589http://secunia.com/advisories/59451http://www-01.ibm.com/support/docview.wss?uid=isg400001843http://www.fortiguard.com/advisory/FG-IR-14-018/http://secunia.com/advisories/59506https://filezilla-project.org/versions.php?type=serverhttp://www-01.ibm.com/support/docview.wss?uid=isg400001841http://secunia.com/advisories/59894http://secunia.com/advisories/60049https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issueshttp://secunia.com/advisories/58743http://secunia.com/advisories/59342http://secunia.com/advisories/59325http://secunia.com/advisories/59354http://secunia.com/advisories/59916http://rhn.redhat.com/errata/RHSA-2014-0624.htmlhttp://marc.info/?l=bugtraq&m=140386311427810&w=2http://rhn.redhat.com/errata/RHSA-2014-0631.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0632.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0630.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0627.htmlhttp://marc.info/?l=bugtraq&m=140369637402535&w=2http://rhn.redhat.com/errata/RHSA-2014-0680.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0633.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0626.htmlhttp://secunia.com/advisories/60066http://puppetlabs.com/security/cve/cve-2014-0224http://secunia.com/advisories/59990http://secunia.com/advisories/60522http://linux.oracle.com/errata/ELSA-2014-1053.htmlhttp://secunia.com/advisories/60577http://secunia.com/advisories/59784http://secunia.com/advisories/59878http://secunia.com/advisories/60176http://secunia.com/advisories/60567http://secunia.com/advisories/60571http://secunia.com/advisories/60819http://support.apple.com/kb/HT6443http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlhttp://marc.info/?l=bugtraq&m=141164638606214&w=2http://marc.info/?l=bugtraq&m=141383465822787&w=2http://marc.info/?l=bugtraq&m=141025641601169&w=2http://marc.info/?l=bugtraq&m=141383410222440&w=2http://marc.info/?l=bugtraq&m=141147110427269&w=2http://marc.info/?l=bugtraq&m=140983229106599&w=2http://secunia.com/advisories/61815http://www.securitytracker.com/id/1031032http://www.vmware.com/security/advisories/VMSA-2014-0012.htmlhttp://seclists.org/fulldisclosure/2014/Dec/23http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttp://www.securitytracker.com/id/1031594http://marc.info/?l=bugtraq&m=142546741516006&w=2http://marc.info/?l=bugtraq&m=142350350616251&w=2http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.htmlhttp://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0http://www.mandriva.com/security/advisories?name=MDVSA-2015:062http://marc.info/?l=bugtraq&m=142805027510172&w=2http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttp://marc.info/?l=bugtraq&m=141658880509699&w=2http://marc.info/?l=bugtraq&m=140448122410568&w=2http://marc.info/?l=bugtraq&m=140491231331543&w=2http://marc.info/?l=bugtraq&m=140621259019789&w=2http://marc.info/?l=bugtraq&m=140482916501310&w=2http://marc.info/?l=bugtraq&m=140870499402361&w=2http://marc.info/?l=bugtraq&m=140784085708882&w=2http://marc.info/?l=bugtraq&m=140852826008699&w=2http://marc.info/?l=bugtraq&m=140604261522465&w=2http://marc.info/?l=bugtraq&m=140431828824371&w=2http://marc.info/?l=bugtraq&m=140266410314613&w=2http://marc.info/?l=bugtraq&m=140852757108392&w=2http://marc.info/?l=bugtraq&m=140544599631400&w=2http://marc.info/?l=bugtraq&m=140389274407904&w=2http://marc.info/?l=bugtraq&m=140672208601650&w=2http://marc.info/?l=bugtraq&m=140317760000786&w=2http://marc.info/?l=bugtraq&m=140904544427729&w=2http://marc.info/?l=bugtraq&m=140389355508263&w=2http://marc.info/?l=bugtraq&m=140752315422991&w=2http://marc.info/?l=bugtraq&m=140794476212181&w=2https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.htmlhttps://www.novell.com/support/kb/doc.php?id=7015271https://www.ibm.com/support/docview.wss?uid=ssg1S1004671https://www.ibm.com/support/docview.wss?uid=ssg1S1004670https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754http://www-01.ibm.com/support/docview.wss?uid=swg24037870http://www-01.ibm.com/support/docview.wss?uid=swg24037732http://www-01.ibm.com/support/docview.wss?uid=swg24037731http://www-01.ibm.com/support/docview.wss?uid=swg24037730http://www-01.ibm.com/support/docview.wss?uid=swg24037729http://www-01.ibm.com/support/docview.wss?uid=swg24037727http://www-01.ibm.com/support/docview.wss?uid=swg21683332http://www-01.ibm.com/support/docview.wss?uid=swg21678233http://www-01.ibm.com/support/docview.wss?uid=swg21677836http://www-01.ibm.com/support/docview.wss?uid=swg21677131http://www-01.ibm.com/support/docview.wss?uid=swg21677080http://www-01.ibm.com/support/docview.wss?uid=swg21676889http://www-01.ibm.com/support/docview.wss?uid=swg21676879http://www-01.ibm.com/support/docview.wss?uid=swg21676833http://www-01.ibm.com/support/docview.wss?uid=swg21676786http://www-01.ibm.com/support/docview.wss?uid=swg21676644http://www-01.ibm.com/support/docview.wss?uid=swg21676615http://www-01.ibm.com/support/docview.wss?uid=swg21676536http://www-01.ibm.com/support/docview.wss?uid=swg21676529http://www-01.ibm.com/support/docview.wss?uid=swg21676501http://www-01.ibm.com/support/docview.wss?uid=swg21676478http://www-01.ibm.com/support/docview.wss?uid=swg21676334http://www-01.ibm.com/support/docview.wss?uid=swg21676333http://www-01.ibm.com/support/docview.wss?uid=swg21676071http://www-01.ibm.com/support/docview.wss?uid=swg21675821http://www-01.ibm.com/support/docview.wss?uid=swg21675626http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163http://www.vmware.com/security/advisories/VMSA-2014-0006.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2014:106http://www.mandriva.com/security/advisories?name=MDVSA-2014:105http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdfhttp://www.ibm.com/support/docview.wss?uid=swg24037783http://www.ibm.com/support/docview.wss?uid=swg21676877http://www.ibm.com/support/docview.wss?uid=swg21676793http://www.ibm.com/support/docview.wss?uid=swg21676356http://www.ibm.com/support/docview.wss?uid=swg1IT02314http://www.ibm.com/support/docview.wss?uid=ssg1S1004678http://www.ibm.com/support/docview.wss?uid=isg3T1020948http://www.f-secure.com/en/web/labs_global/fsc-2014-6http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.htmlhttp://support.citrix.com/article/CTX140876http://security.gentoo.org/glsa/glsa-201407-05.xmlhttp://secunia.com/advisories/61254http://secunia.com/advisories/59677http://secunia.com/advisories/59661http://secunia.com/advisories/59529http://secunia.com/advisories/59525http://secunia.com/advisories/59518http://secunia.com/advisories/59502http://secunia.com/advisories/59483http://secunia.com/advisories/59460http://secunia.com/advisories/59454http://secunia.com/advisories/59449http://secunia.com/advisories/59448http://secunia.com/advisories/59447http://secunia.com/advisories/59446http://secunia.com/advisories/59445http://secunia.com/advisories/59444http://secunia.com/advisories/59441http://secunia.com/advisories/59440http://secunia.com/advisories/59437http://secunia.com/advisories/59435http://secunia.com/advisories/59429http://secunia.com/advisories/59389http://secunia.com/advisories/59380http://secunia.com/advisories/59375http://secunia.com/advisories/59374http://secunia.com/advisories/59368http://secunia.com/advisories/59365http://secunia.com/advisories/59364http://secunia.com/advisories/59362http://secunia.com/advisories/59347http://secunia.com/advisories/59338http://secunia.com/advisories/59310http://secunia.com/advisories/59306http://secunia.com/advisories/59305http://secunia.com/advisories/59287http://secunia.com/advisories/59284http://secunia.com/advisories/59282http://secunia.com/advisories/59264http://secunia.com/advisories/59231http://secunia.com/advisories/59223http://secunia.com/advisories/59215http://secunia.com/advisories/59214http://secunia.com/advisories/59211http://secunia.com/advisories/59202http://secunia.com/advisories/59192http://secunia.com/advisories/59190http://secunia.com/advisories/59189http://secunia.com/advisories/59188http://secunia.com/advisories/59186http://secunia.com/advisories/59175http://secunia.com/advisories/59167http://secunia.com/advisories/59163http://secunia.com/advisories/59142http://secunia.com/advisories/59135http://secunia.com/advisories/59132http://secunia.com/advisories/59101http://secunia.com/advisories/59093http://secunia.com/advisories/59040http://secunia.com/advisories/59004http://secunia.com/advisories/58977http://secunia.com/advisories/58945http://secunia.com/advisories/58742http://secunia.com/advisories/58719http://secunia.com/advisories/58716http://secunia.com/advisories/58714http://secunia.com/advisories/58713http://secunia.com/advisories/58667http://secunia.com/advisories/58660http://secunia.com/advisories/58615http://secunia.com/advisories/58492http://secunia.com/advisories/58433http://secunia.com/advisories/58337http://seclists.org/fulldisclosure/2014/Jun/38http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmlhttp://kb.juniper.net/InfoCenter/index?page=content&id=KB29217http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.aschttp://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlhttp://www.securityfocus.com/archive/1/534161/100/0/threadedhttps://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdfhttps://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441https://nvd.nist.govhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888https://usn.ubuntu.com/2232-1/https://www.debian.org/security/./dsa-2950