5.8
CVSSv2

CVE-2014-0224

Published: 05/06/2014 Updated: 28/07/2020
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.4 | Impact Score: 5.2 | Exploitability Score: 2.2
VMScore: 640
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

OpenSSL prior to 0.9.8za, 1.0.0 prior to 1.0.0m, and 1.0.1 prior to 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle malicious users to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

Vulnerability Trend

Vendor Advisories

USN-2232-1 introduced a regression in OpenSSL ...
It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server (CVE-2014-0224 ) ...
USN-2232-1 introduced a regression in OpenSSL ...
It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server (CVE-2014-0224 ) ...
It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server ...
Several security issues were fixed in OpenSSL ...
USN-2232-1 introduced a regression in OpenSSL ...
Big Data Extensions prior to 200 Horizon View prior to 532   vCenter Support Assistant prior to 5511   vCloud Automation Center prior to 6012   vCenter Configuration Manager prior to 572   ITBM Standard  prior to 11   vCenter Operations Manager prior to 582   vSphere PowerCLI 5x   vCSA prior to 55u1b   vFabric Web Server ...
Debian Bug report logs - #750665 openssl: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470 Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Jeff Ballard < ...
Multiple vulnerabilities have been discovered in OpenSSL: CVE-2014-0195 Jueri Aedla discovered that a buffer overflow in processing DTLS fragments could lead to the execution of arbitrary code or denial of service CVE-2014-0221 Imre Rad discovered the processing of DTLS hello packets is susceptible to denial of service CVE-20 ...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # SSA-234763: OpenSSL Vulnerabilities in Siemens Industrial Products Publication Date: 2014-07-17 Last Update: 2020-02-10 Current Version: 16 CVSS v31 Base Score: 74 SUMMARY ======= Vulnerabilities in OpenSSL (see wwwopensslorg/news/secadv_20140605txt) a ...
A potential security vulnerability has been identified with certain HP LaserJet Printers, MFPs and certain HP OfficeJet Enterprise Printers using OpenSSL The vulnerability could be exploited remotely to allow remote unauthorized access Note: This OpenSSL vulnerability was detected in specific OpenSSL versions OpenSSL is a 3rd party product th ...
It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server (CVE-2014-0224 ) Note: In order to exploit this flaw, both the server and the client mus ...
Multiple products from Tenable Network Security are vulnerable to the recently disclosed OpenSSL 'CCS Injection' vulnerability as they bundle affected versions of the software The flaw in OpenSSL is due to a flaw in the handshake process With a carefully crafted handshake, a remote attacker can force the client or server to use weak keying mate ...
Blue Coat products using affected versions of OpenSSL 098, 100, and 101 are vulnerable to one or more vulnerabilities in OpenSSL A remote attacker may exploit these vulnerabilities on clients or servers to become a man-in-the-middle, execute arbitrary code, inject data into sessions, or cause a denial-of-service ...
Debian Bug report logs - #775888 virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427 Package: virtualbox; Maintainer for virtualbox is Debian Virtualbox Team <team+debian-virtualbox@trackerdebianorg>; Source for virtualbox is src:virtualbox (PTS, buildd, popcon) Reported by: Mori ...
<!--googleoff: all--> <!-- Support Core Service to be available throught the page --> CTX140876 Citrix Security Advisory for OpenSSL Vulnerabilities (June 2014) <!-- ...
Oracle Critical Patch Update Advisory - October 2017 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the ...
Oracle Critical Patch Update Advisory - July 2016 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous C ...
<!-- content goes here --> Oracle Critical Patch Update Advisory - January 2015 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisor ...
Oracle Critical Patch Update Advisory - October 2016 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previou ...
Oracle Critical Patch Update Advisory - July 2017 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous C ...

Nmap Scripts

ssl-ccs-injection

Detects whether a server is vulnerable to the SSL/TLS "CCS Injection" vulnerability (CVE-2014-0224), first discovered by Masashi Kikuchi. The script is based on the ccsinjection.c code authored by Ramon de C Valle (https://gist.github.com/rcvalle/71f4b027d61a78c42607)

nmap -p 443 --script ssl-ccs-injection <target>

PORT STATE SERVICE 443/tcp open https | ssl-ccs-injection: | VULNERABLE: | SSL/TLS MITM vulnerability (CCS Injection) | State: VULNERABLE | Risk factor: High | Description: | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before | 1.0.1h does not properly restrict processing of ChangeCipherSpec | messages, which allows man-in-the-middle attackers to trigger use | of a zero-length master key in certain OpenSSL-to-OpenSSL | communications, and consequently hijack sessions or obtain | sensitive information, via a crafted TLS handshake, aka the | "CCS Injection" vulnerability. | | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 | http://www.cvedetails.com/cve/2014-0224 |_ http://www.openssl.org/news/secadv_20140605.txt

Metasploit Modules

OpenSSL Server-Side ChangeCipherSpec Injection Scanner

This module checks for the OpenSSL ChangeCipherSpec (CCS) Injection vulnerability. The problem exists in the handling of early CCS messages during session negotiation. Vulnerable installations of OpenSSL accepts them, while later implementations do not. If successful, an attacker can leverage this vulnerability to perform a man-in-the-middle (MITM) attack by downgrading the cipher spec between a client and server. This issue was first reported in early June, 2014.

msf > use auxiliary/scanner/ssl/openssl_ccs
      msf auxiliary(openssl_ccs) > show actions
            ...actions...
      msf auxiliary(openssl_ccs) > set ACTION <action-name>
      msf auxiliary(openssl_ccs) > show options
            ...show and set options...
      msf auxiliary(openssl_ccs) > run

Github Repositories

With best practices under your fingertips, you will not lose precious time on reinventing the wheel. Instead, you can focus on writing quality code and getting the job done.

Title: Android Development | Best Practices Introduction Android development continues to dominate the world of mobile development Fun projects, great pay, and tons of job prospects are just some of the reasons developers are starting their journeys into the exciting world of the Android operating system Some experts say that there has never been a better time to learn Andro

Adam Langley's tool for testing for OpenSSL CVE-2014-0224, originally published here: wwwimperialvioletorg/2014/06/05/earlyccshtml To build the tool: $ export GOPATH=$(pwd) $ go build openssl-ccs-cve-2014-0224go Tested with go 122 and 13 The src/my-tls directory contains the patched version of the crypto/tls package

This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv1.1, and TLSv1.2) advertising a comprehensive set of ciphers.

OpenSSL CCS Inject Test This script is designed for detection of vulnerable servers (CVE-2014-0224) in a wide range of configurations It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv11, and TLSv12) advertising a comprehensive set of ciphers Changes: v01 - Updated receive buffer sizes to account for longer certificate messages v02 - Upda

Used for evaluating hosts for CVE-2014-0224

Evaluates hosts for CVE-2014-0224 vulnerability cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2014-0224 Usage: ccs-evalpy list-of-hoststxt -Takes in a list of hosts, line seperated Checks the host for common SSL ports using nmap Peforms PoC injection test supplied by RedHat (fake-client-early-ccspl) Writes results to "local-results-list-of-hoststxt"

A Simple, Secured Default HTTP(S) Server for Golang

Go secureserver Out-of-the-box, Go is a fully capable HTTP/HTTPS server However, it is not configured correctly to avoid malicious clients, timeouts, or even simple SSL auto setup with LetsEncryptorg This repository exists to help go developers launch a secure, simple HTTPS server This configuration blocks major attacks like: BEAST attack POODLE (SSLv3) POODLE (TLS) Heartb

A python script to parse Qualys Reports effectively

qualysparser A python script to parse Qualys Reports effectively Filter our Qualys data based on Title, Severity, QID or CVE Sample Usage eg, usage 1: python qualysparsepy -f qualysreportcsv -t "Feature Denial of Service" eg, usage 2: python qualysparsepy -f qualysreportcsv -s 5 eg, usage 3: python qualysparsepy -f qualysreportcsv -c CVE-2014-0224

CTF machine Writeup

HackLAB: Vulnix ~Vulnhub Writeup CTF machine Writeup Author: Reboot User Download link: downloadvulnhubcom/hacklab/Vulnix7z SCANNING nmap -p- Target_ip 2 nmap -sV -A --script vuln Target_ip root@v5ha1i:~# nmap -sV -A --script Vuln 192168122130 Starting Nmap 770 ( nmaporg ) at 2020-06-18 02:23 EDT Nmap scan report for 192168122130 Host is up (00

Mirror

Donate if you want wwwpaypalme/compilenix How it looks Slack CLI All config settings (or defaults via Configexamplejs) are overwritten by cli parameters! node indexjs --enableSlack false --domains wwwmicrosoftcom,expiredbadsslcom --ignore Expire,PubKeySize Usage install nvm (githubcom/creationix/nvm) install c/c++ build tools apt install build-essen

CVE advisories tests

CVE advisories tests CVE-2015-0235 (GHOST) CVE-2014-0224 (OpenSSL CCS injection)

MassBleed SSL Vulnerability Scanner

MassBleed SSL Vulnerability Scanner USAGE: sh massbleedsh [CIDR|IP] [single|port|subnet] [port] [proxy] ABOUT: This script has four main functions with the ability to proxy all connections: To mass scan any CIDR range for OpenSSL vulnerabilities via port 443/tcp (https) (example: sh massbleedsh 19216800/16) To scan any CIDR range for OpenSSL vulnerabilities via any cust

MassBleed SSL Vulnerability Scanner USAGE: sh massbleedsh [CIDR|IP] [single|port|subnet] [port] [proxy] ABOUT: This script has four main functions with the ability to proxy all connections: To mass scan any CIDR range for OpenSSL vulnerabilities via port 443/tcp (https) (example: sh massbleedsh 19216800/16) To scan any CIDR range for OpenSSL vulnerabilities via any cust

Vuls検証環境

laputa なんぞこれ laputa は vuls の機能をお試しで検証するDocker環境です. 様々なOSをセットアップします. centos 7,8 debian 10 ubuntu 18 本来はvulsctlを使うと大変便利ですが vuls を開発しながら使うことを想定しているので 各ツールは make install でローカル環境に導入しています. また,

1 A2SV? Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK etc A Support Vulnerability - CVE-2007-1858] Anonymous Cipher - CVE-2012-4929] CRIME(SPDY) - CVE-2014-0160] CCS Injection - CVE-2014-0224] HeartBleed - CVE-2014-3566] SSLv3 POODLE - CVE-2015-0204] FREAK Attack - CVE-2015-4000] LOGJAM Attack - CVE-2016-0800] SSLv2 DROWN B Dev Plan -

Escaneo automático a vulnerabilidad de SSL HeartBleed, CCS Injection, SSLv3 POODLE, FREAK

1 A2SV? Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK etc A Support Vulnerability - CVE-2007-1858] Anonymous Cipher - CVE-2012-4929] CRIME(SPDY) - CVE-2014-0160] CCS Injection - CVE-2014-0224] HeartBleed - CVE-2014-3566] SSLv3 POODLE - CVE-2015-0204] FREAK Attack - CVE-2015-4000] LOGJAM Attack - CVE-2016-0800] SSLv2 DROWN B Dev Plan -

1 A2SV? Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK etc A Support Vulnerability - CVE-2007-1858] Anonymous Cipher - CVE-2012-4929] CRIME(SPDY) - CVE-2014-0160] CCS Injection - CVE-2014-0224] HeartBleed - CVE-2014-3566] SSLv3 POODLE - CVE-2015-0204] FREAK Attack - CVE-2015-4000] LOGJAM Attack - CVE-2016-0800] SSLv2 DROWN B Dev Plan -

Auto Scanning to SSL Vulnerability

1 A2SV? Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK etc A Support Vulnerability - CVE-2007-1858] Anonymous Cipher - CVE-2012-4929] CRIME(SPDY) - CVE-2014-0160] CCS Injection - CVE-2014-0224] HeartBleed - CVE-2014-3566] SSLv3 POODLE - CVE-2015-0204] FREAK Attack - CVE-2015-4000] LOGJAM Attack - CVE-2016-0800] SSLv2 DROWN B Dev Plan -

1 A2SV? Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK etc A Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SDPY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN B Dev Plan [PLAN

1 A2SV? Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK etc A Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SDPY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN B Dev Plan [PLAN

Improving Intrusion Detectors by Crook-sourcing

DeepDig A framework for deception-enhanced IDS training and evaluation Network Traffic Generation The platform can be used to generate attack and benign traffic and evaluation data Supported attack types are described below Additional attacks can be customized in the framework # Attack Type Description Software 1 CVE-2014-0160 Information leak OpenSSL 2 CVE-2012-18

Recent Articles

‘Secure’ criminal justice email system relies on obsolete protocols
The Register • John Leyden • 03 Aug 2015

We're upgrading it anyway. Honest, no really, yawns Ministry of Justice

The Criminal Justice Secure eMail system (CJSM) relies on insecure protocols that some security conscious organisations deliberately block, claims a Register source.
CJSM is run by Vodafone on behalf of the government and designed to provide secure communications between the GSI (Government Secure Intranet) and external organisations in the criminal justice field, such as solicitors and police contractors.
Security problems with the system came to El Reg’s attention following a tip...

How long is too long to wait for a security fix?
The Register • Trevor Pott • 25 Jul 2014

Synology finally patches OpenSSL bugs in Trevor's NAS

Sysadmin blog Synology quietly released version 4.2-3250 of its DiskStation Manager (DSM) operating system this month. This squashes critical security bugs in version 4.2 of DSM – bugs that were fixed in version 5.0 in June, so consider this a back port.
Version 4.2 is old but still in use in various models, such as the DS109. The update got me thinking about the security of NASes and similar devices on our networks.
New build 3250 addresses a kernel-level security issue as well as...

FireEye patches OS, torpedos Exploit-DB disclosure
The Register • Darren Pauli • 10 Jul 2014

Researcher suspended after zero-day dump

FireEye has patched a series of publicly-disclosed flaws in its operating system (FEOS) that facilitated man-in-the-middle attacks and command injection.
The vulnerabilities released over June affected versions NX, EX, AX, FX, and CM of the FEOS and were patched in the first individual security bulletin for the system.
The company urged customers to apply fixes.
"FireEye encourages all customers to upgrade to the most current releases as soon as practical - especially customers...

Surprise Android 'KitKat' update fixes nasty OpenSSL vuln
The Register • Neil McAllister in San Francisco • 20 Jun 2014

Android 4.4.4 shipping just 18 days after the previous version

Android fans who are hoping Google will debut a new version of the OS at its annual I/O conference in San Francsico next week might be in for a disappointment ... because the company is rolling out a new version this week.
On Friday, the Chocolate Factory published firmware images of Android 4.4.4 – yes, we're still talking "KitKat" – for the Nexus 4 and 5 phones and the Nexus 7 and 10 fondleslabs. The build number of the new release is KTU84P.
There are no official release notes...

Scans Quantify Vulnerable OpenSSL Servers
Threatpost • Michael Mimoso • 13 Jun 2014

Certain mitigating factors made the recent OpenSSL man-in-the-middle vulnerability a notch or two below Heartbleed in terms of criticality. With that in consideration, it’s probably no surprise that patching levels for CVE-2014-0224 aren’t as high out of the gate as they were for Heartbleed.
Ivan Ristic, an application security researcher and director of engineering at Qualys, said that his company’s research arm, SSL Labs, has been running a remote check for servers vulnerable to th...

VMware Patches ESXi Against OpenSSL Flaw, But Many Other Products Still Vulnerable
Threatpost • Dennis Fisher • 12 Jun 2014

While the group of vulnerabilities that the OpenSSL Project patched last week hasn’t grown into the kind of mess that the Heartbleed flaw did, the vulnerabilities still affect a huge range of products. Vendors are still making their way through the patching process, and VMware has released an advisory confirming that a long list of its products are vulnerable to the latest OpenSSL bugs. The company said in the advisory that there is only a patch available for one of its products right now, ESX...

Patch NOW: Six new bugs found in OpenSSL – including spying hole
The Register • John Leyden • 05 Jun 2014

On a scale of 1 to Heartbleed, this is a 7

The OpenSSL team has pushed out fixes for six security vulnerabilities in the widely used crypto library.
These holes include a flaw that enables man-in-the-middle (MITM) eavesdropping on encrypted connections, and another that allows miscreants to drop malware on at-risk systems.
A DTLS invalid fragment bug (CVE-2014-0195, affects versions 0.9.8, 1.0.0 and 1.0.1) can be used to inject malicious code into vulnerable software in apps, devices and servers. DTLS is more or less TLS encr...

New OpenSSL MITM Flaw Affects All Clients, Some Server Versions
Threatpost • Dennis Fisher • 05 Jun 2014

There is a new, remotely exploitable vulnerability in OpenSSL that could enable an attacker to intercept and decrypt traffic between vulnerable clients and servers. The flaw affects all versions of the OpenSSL client and versions 1.0.1 and 1.0.2-beta1 of the server software.
The new vulnerability could only be exploited to decrypt traffic between a vulnerable client and a vulnerable server, and the attacker would need to have a man-in-the-middle position on a network in order to do so. Tha...

References

CWE-326http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.aschttp://ccsinjection.lepidum.co.jphttp://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.htmlhttp://esupport.trendmicro.com/solution/en-US/1103813.aspxhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217http://linux.oracle.com/errata/ELSA-2014-1053.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlhttp://lists.opensuse.org/opensuse-updates/2015-02/msg00030.htmlhttp://marc.info/?l=bugtraq&m=140266410314613&w=2http://marc.info/?l=bugtraq&m=140317760000786&w=2http://marc.info/?l=bugtraq&m=140369637402535&w=2http://marc.info/?l=bugtraq&m=140386311427810&w=2http://marc.info/?l=bugtraq&m=140389274407904&w=2http://marc.info/?l=bugtraq&m=140389355508263&w=2http://marc.info/?l=bugtraq&m=140431828824371&w=2http://marc.info/?l=bugtraq&m=140448122410568&w=2http://marc.info/?l=bugtraq&m=140482916501310&w=2http://marc.info/?l=bugtraq&m=140491231331543&w=2http://marc.info/?l=bugtraq&m=140499864129699&w=2http://marc.info/?l=bugtraq&m=140544599631400&w=2http://marc.info/?l=bugtraq&m=140604261522465&w=2http://marc.info/?l=bugtraq&m=140621259019789&w=2http://marc.info/?l=bugtraq&m=140672208601650&w=2http://marc.info/?l=bugtraq&m=140752315422991&w=2http://marc.info/?l=bugtraq&m=140784085708882&w=2http://marc.info/?l=bugtraq&m=140794476212181&w=2http://marc.info/?l=bugtraq&m=140852757108392&w=2http://marc.info/?l=bugtraq&m=140852826008699&w=2http://marc.info/?l=bugtraq&m=140870499402361&w=2http://marc.info/?l=bugtraq&m=140904544427729&w=2http://marc.info/?l=bugtraq&m=140983229106599&w=2http://marc.info/?l=bugtraq&m=141025641601169&w=2http://marc.info/?l=bugtraq&m=141147110427269&w=2http://marc.info/?l=bugtraq&m=141164638606214&w=2http://marc.info/?l=bugtraq&m=141383410222440&w=2http://marc.info/?l=bugtraq&m=141383465822787&w=2http://marc.info/?l=bugtraq&m=141658880509699&w=2http://marc.info/?l=bugtraq&m=142350350616251&w=2http://marc.info/?l=bugtraq&m=142546741516006&w=2http://marc.info/?l=bugtraq&m=142805027510172&w=2http://puppetlabs.com/security/cve/cve-2014-0224http://rhn.redhat.com/errata/RHSA-2014-0624.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0626.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0627.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0630.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0631.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0632.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0633.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0680.htmlhttp://seclists.org/fulldisclosure/2014/Dec/23http://seclists.org/fulldisclosure/2014/Jun/38http://secunia.com/advisories/58128http://secunia.com/advisories/58337http://secunia.com/advisories/58385http://secunia.com/advisories/58433http://secunia.com/advisories/58492http://secunia.com/advisories/58579http://secunia.com/advisories/58615http://secunia.com/advisories/58639http://secunia.com/advisories/58660http://secunia.com/advisories/58667http://secunia.com/advisories/58713http://secunia.com/advisories/58714http://secunia.com/advisories/58716http://secunia.com/advisories/58719http://secunia.com/advisories/58742http://secunia.com/advisories/58743http://secunia.com/advisories/58745http://secunia.com/advisories/58759http://secunia.com/advisories/58930http://secunia.com/advisories/58939http://secunia.com/advisories/58945http://secunia.com/advisories/58977http://secunia.com/advisories/59004http://secunia.com/advisories/59012http://secunia.com/advisories/59040http://secunia.com/advisories/59043http://secunia.com/advisories/59055http://secunia.com/advisories/59063http://secunia.com/advisories/59093http://secunia.com/advisories/59101http://secunia.com/advisories/59120http://secunia.com/advisories/59126http://secunia.com/advisories/59132http://secunia.com/advisories/59135http://secunia.com/advisories/59142http://secunia.com/advisories/59162http://secunia.com/advisories/59163http://secunia.com/advisories/59167http://secunia.com/advisories/59175http://secunia.com/advisories/59186http://secunia.com/advisories/59188http://secunia.com/advisories/59189http://secunia.com/advisories/59190http://secunia.com/advisories/59191http://secunia.com/advisories/59192http://secunia.com/advisories/59202http://secunia.com/advisories/59211http://secunia.com/advisories/59214http://secunia.com/advisories/59215http://secunia.com/advisories/59223http://secunia.com/advisories/59231http://secunia.com/advisories/59264http://secunia.com/advisories/59282http://secunia.com/advisories/59284http://secunia.com/advisories/59287http://secunia.com/advisories/59300http://secunia.com/advisories/59301http://secunia.com/advisories/59305http://secunia.com/advisories/59306http://secunia.com/advisories/59310http://secunia.com/advisories/59325http://secunia.com/advisories/59338http://secunia.com/advisories/59342http://secunia.com/advisories/59347http://secunia.com/advisories/59354http://secunia.com/advisories/59362http://secunia.com/advisories/59364http://secunia.com/advisories/59365http://secunia.com/advisories/59368http://secunia.com/advisories/59370http://secunia.com/advisories/59374http://secunia.com/advisories/59375http://secunia.com/advisories/59380http://secunia.com/advisories/59383http://secunia.com/advisories/59389http://secunia.com/advisories/59413http://secunia.com/advisories/59429http://secunia.com/advisories/59435http://secunia.com/advisories/59437http://secunia.com/advisories/59438http://secunia.com/advisories/59440http://secunia.com/advisories/59441http://secunia.com/advisories/59442http://secunia.com/advisories/59444http://secunia.com/advisories/59445http://secunia.com/advisories/59446http://secunia.com/advisories/59447http://secunia.com/advisories/59448http://secunia.com/advisories/59449http://secunia.com/advisories/59450http://secunia.com/advisories/59451http://secunia.com/advisories/59454http://secunia.com/advisories/59459http://secunia.com/advisories/59460http://secunia.com/advisories/59483http://secunia.com/advisories/59490http://secunia.com/advisories/59491http://secunia.com/advisories/59495http://secunia.com/advisories/59502http://secunia.com/advisories/59506http://secunia.com/advisories/59514http://secunia.com/advisories/59518http://secunia.com/advisories/59525http://secunia.com/advisories/59528http://secunia.com/advisories/59529http://secunia.com/advisories/59530http://secunia.com/advisories/59589http://secunia.com/advisories/59602http://secunia.com/advisories/59655http://secunia.com/advisories/59659http://secunia.com/advisories/59661http://secunia.com/advisories/59666http://secunia.com/advisories/59669http://secunia.com/advisories/59677http://secunia.com/advisories/59721http://secunia.com/advisories/59784http://secunia.com/advisories/59824http://secunia.com/advisories/59827http://secunia.com/advisories/59878http://secunia.com/advisories/59885http://secunia.com/advisories/59894http://secunia.com/advisories/59916http://secunia.com/advisories/59990http://secunia.com/advisories/60049http://secunia.com/advisories/60066http://secunia.com/advisories/60176http://secunia.com/advisories/60522http://secunia.com/advisories/60567http://secunia.com/advisories/60571http://secunia.com/advisories/60577http://secunia.com/advisories/60819http://secunia.com/advisories/61254http://secunia.com/advisories/61815http://security.gentoo.org/glsa/glsa-201407-05.xmlhttp://support.apple.com/kb/HT6443http://support.citrix.com/article/CTX140876http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.htmlhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-opensslhttp://www.blackberry.com/btsc/KB36051http://www.fortiguard.com/advisory/FG-IR-14-018/http://www.f-secure.com/en/web/labs_global/fsc-2014-6http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htmhttp://www.ibm.com/support/docview.wss?uid=isg3T1020948http://www.ibm.com/support/docview.wss?uid=ssg1S1004678http://www.ibm.com/support/docview.wss?uid=swg1IT02314http://www.ibm.com/support/docview.wss?uid=swg21676356http://www.ibm.com/support/docview.wss?uid=swg21676793http://www.ibm.com/support/docview.wss?uid=swg21676877http://www.ibm.com/support/docview.wss?uid=swg24037783http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdfhttp://www.kb.cert.org/vuls/id/978508http://www.kerio.com/support/kerio-control/release-historyhttp://www.mandriva.com/security/advisories?name=MDVSA-2014:105http://www.mandriva.com/security/advisories?name=MDVSA-2014:106http://www.mandriva.com/security/advisories?name=MDVSA-2015:062http://www.novell.com/support/kb/doc.php?id=7015264http://www.novell.com/support/kb/doc.php?id=7015300http://www.openssl.org/news/secadv_20140605.txthttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttp://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlhttp://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlhttp://www.securityfocus.com/archive/1/534161/100/0/threadedhttp://www.securitytracker.com/id/1031032http://www.securitytracker.com/id/1031594http://www.splunk.com/view/SP-CAAAM2Dhttp://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-downloadhttp://www.vmware.com/security/advisories/VMSA-2014-0006.htmlhttp://www.vmware.com/security/advisories/VMSA-2014-0012.htmlhttp://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0http://www-01.ibm.com/support/docview.wss?uid=isg400001841http://www-01.ibm.com/support/docview.wss?uid=isg400001843http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506http://www-01.ibm.com/support/docview.wss?uid=swg21673137http://www-01.ibm.com/support/docview.wss?uid=swg21675626http://www-01.ibm.com/support/docview.wss?uid=swg21675821http://www-01.ibm.com/support/docview.wss?uid=swg21676035http://www-01.ibm.com/support/docview.wss?uid=swg21676062http://www-01.ibm.com/support/docview.wss?uid=swg21676071http://www-01.ibm.com/support/docview.wss?uid=swg21676333http://www-01.ibm.com/support/docview.wss?uid=swg21676334http://www-01.ibm.com/support/docview.wss?uid=swg21676419http://www-01.ibm.com/support/docview.wss?uid=swg21676478http://www-01.ibm.com/support/docview.wss?uid=swg21676496http://www-01.ibm.com/support/docview.wss?uid=swg21676501http://www-01.ibm.com/support/docview.wss?uid=swg21676529http://www-01.ibm.com/support/docview.wss?uid=swg21676536http://www-01.ibm.com/support/docview.wss?uid=swg21676615http://www-01.ibm.com/support/docview.wss?uid=swg21676644http://www-01.ibm.com/support/docview.wss?uid=swg21676655http://www-01.ibm.com/support/docview.wss?uid=swg21676786http://www-01.ibm.com/support/docview.wss?uid=swg21676833http://www-01.ibm.com/support/docview.wss?uid=swg21676845http://www-01.ibm.com/support/docview.wss?uid=swg21676879http://www-01.ibm.com/support/docview.wss?uid=swg21676889http://www-01.ibm.com/support/docview.wss?uid=swg21677080http://www-01.ibm.com/support/docview.wss?uid=swg21677131http://www-01.ibm.com/support/docview.wss?uid=swg21677390http://www-01.ibm.com/support/docview.wss?uid=swg21677527http://www-01.ibm.com/support/docview.wss?uid=swg21677567http://www-01.ibm.com/support/docview.wss?uid=swg21677695http://www-01.ibm.com/support/docview.wss?uid=swg21677828http://www-01.ibm.com/support/docview.wss?uid=swg21677836http://www-01.ibm.com/support/docview.wss?uid=swg21678167http://www-01.ibm.com/support/docview.wss?uid=swg21678233http://www-01.ibm.com/support/docview.wss?uid=swg21678289http://www-01.ibm.com/support/docview.wss?uid=swg21683332http://www-01.ibm.com/support/docview.wss?uid=swg24037727http://www-01.ibm.com/support/docview.wss?uid=swg24037729http://www-01.ibm.com/support/docview.wss?uid=swg24037730http://www-01.ibm.com/support/docview.wss?uid=swg24037731http://www-01.ibm.com/support/docview.wss?uid=swg24037732http://www-01.ibm.com/support/docview.wss?uid=swg24037761http://www-01.ibm.com/support/docview.wss?uid=swg24037870http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=Ehttp://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=Ehttp://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757https://access.redhat.com/site/blogs/766093/posts/908133https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issueshttps://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1https://bugzilla.redhat.com/show_bug.cgi?id=1103586https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdfhttps://discussions.nessus.org/thread/7517https://filezilla-project.org/versions.php?type=serverhttps://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946https://kb.bluecoat.com/index?page=content&id=SA80https://kc.mcafee.com/corporate/index?page=content&id=SB10075https://www.ibm.com/support/docview.wss?uid=ssg1S1004670https://www.ibm.com/support/docview.wss?uid=ssg1S1004671https://www.imperialviolet.org/2014/06/05/earlyccs.htmlhttps://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdfhttps://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdfhttps://www.novell.com/support/kb/doc.php?id=7015271https://www.rapid7.com/db/vulnerabilities/apple-osx-openssl-cve-2014-0224https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2014-0224https://threatpost.com/vmware-patches-esxi-against-openssl-flaw-but-many-other-products-still-vulnerable/106605/https://nvd.nist.govhttps://ics-cert.us-cert.gov/advisories/ICSA-14-198-03Ghttps://usn.ubuntu.com/2232-3/